Q. What happens to the source IP address of a packet when it passes through a NAT device?
A.
It remains unchanged
B.
It is replaced with the NAT device's public IP address
C.
It is replaced with a random IP address
D.
It is removed from the packet
Show solution
Solution
The source IP address of a packet is replaced with the NAT device's public IP address when it passes through.
Correct Answer:
B
— It is replaced with the NAT device's public IP address
Learn More →
Q. What happens when a link in a network using STP fails?
A.
The network crashes
B.
STP recalculates the topology
C.
All devices are reset
D.
Traffic is rerouted immediately without delay
Show solution
Solution
When a link fails, STP recalculates the topology to find an alternate path and maintain a loop-free network.
Correct Answer:
B
— STP recalculates the topology
Learn More →
Q. What is a common use case for Network Address Translation?
A.
Connecting to a VPN
B.
Hiding internal IP addresses from external networks
C.
Improving network speed
D.
Creating a mesh network
Show solution
Solution
NAT is commonly used to hide internal IP addresses from external networks, enhancing security.
Correct Answer:
B
— Hiding internal IP addresses from external networks
Learn More →
Q. What is a potential drawback of using NAT?
A.
It simplifies network management
B.
It can complicate peer-to-peer applications
C.
It enhances security by hiding internal IP addresses
D.
It reduces the number of required public IP addresses
Show solution
Solution
NAT can complicate peer-to-peer applications because these applications often require direct connections between devices, which NAT can hinder.
Correct Answer:
B
— It can complicate peer-to-peer applications
Learn More →
Q. What is a Virtual LAN (VLAN)?
A.
A physical network segment
B.
A logical grouping of devices
C.
A type of network protocol
D.
A method of data encryption
Show solution
Solution
A VLAN is a logical grouping of devices that allows them to communicate as if they are on the same physical network, regardless of their actual physical location.
Correct Answer:
B
— A logical grouping of devices
Learn More →
Q. What is the default administrative distance of EIGRP?
A.
90
B.
110
C.
120
D.
20
Show solution
Solution
The default administrative distance of EIGRP is 90, which makes it more preferred than OSPF (which has an administrative distance of 110) when both protocols are present.
Correct Answer:
A
— 90
Learn More →
Q. What is the default bridge priority value in Spanning Tree Protocol?
A.
0
B.
32768
C.
65535
D.
4096
Show solution
Solution
The default bridge priority value in STP is 32768, which is used in the election of the Root Bridge.
Correct Answer:
B
— 32768
Learn More →
Q. What is the default bridge priority value in STP?
A.
0
B.
32768
C.
65535
D.
4096
Show solution
Solution
The default bridge priority value in STP is 32768, which is used to determine the root bridge.
Correct Answer:
B
— 32768
Learn More →
Q. What is the default VLAN ID for untagged traffic on most switches?
Show solution
Solution
The default VLAN ID for untagged traffic on most switches is VLAN 1.
Correct Answer:
A
— 1
Learn More →
Q. What is the default VLAN on most switches?
A.
VLAN 1
B.
VLAN 10
C.
VLAN 100
D.
VLAN 0
Show solution
Solution
Most switches have VLAN 1 as the default VLAN, which is used for management and control traffic.
Correct Answer:
A
— VLAN 1
Learn More →
Q. What is the effect of enabling PortFast on a switch port in STP?
A.
The port will never participate in STP
B.
The port transitions to the forwarding state immediately
C.
The port will block all traffic
D.
The port will only allow management traffic
Show solution
Solution
Enabling PortFast allows a switch port to transition to the forwarding state immediately, bypassing the listening and learning states.
Correct Answer:
B
— The port transitions to the forwarding state immediately
Learn More →
Q. What is the first usable IP address in the subnet 10.0.0.0/8?
A.
10.0.0.0
B.
10.0.0.1
C.
10.0.0.255
D.
10.255.255.255
Show solution
Solution
The first usable IP address in the subnet 10.0.0.0/8 is 10.0.0.1, as 10.0.0.0 is the network address.
Correct Answer:
B
— 10.0.0.1
Learn More →
Q. What is the function of a VLAN Access Control List (VACL)?
A.
To filter traffic between VLANs
B.
To manage VLAN configurations
C.
To monitor VLAN performance
D.
To assign VLANs to ports
Show solution
Solution
A VLAN Access Control List (VACL) is used to filter traffic between VLANs, providing a way to enforce security policies.
Correct Answer:
A
— To filter traffic between VLANs
Learn More →
Q. What is the function of a VPN in network security?
A.
To increase bandwidth
B.
To create a secure connection over a public network
C.
To manage network devices
D.
To monitor network traffic
Show solution
Solution
A VPN (Virtual Private Network) creates a secure connection over a public network, ensuring privacy and security.
Correct Answer:
B
— To create a secure connection over a public network
Learn More →
Q. What is the function of the IP protocol in the TCP/IP model?
A.
To establish a connection between devices
B.
To route packets across networks
C.
To encrypt data for security
D.
To manage network congestion
Show solution
Solution
The IP protocol is responsible for routing packets across networks, determining the best path for data transmission.
Correct Answer:
B
— To route packets across networks
Learn More →
Q. What is the function of the Network Interface layer in the TCP/IP model?
A.
To establish a connection between applications
B.
To manage data flow between devices
C.
To handle physical transmission of data
D.
To provide routing information
Show solution
Solution
The Network Interface layer handles the physical transmission of data over the network medium.
Correct Answer:
C
— To handle physical transmission of data
Learn More →
Q. What is the main advantage of dynamic routing over static routing?
A.
Easier to configure
B.
More secure
C.
Automatically adapts to network changes
D.
Requires less bandwidth
Show solution
Solution
Dynamic routing automatically adapts to network changes, making it more flexible than static routing.
Correct Answer:
C
— Automatically adapts to network changes
Learn More →
Q. What is the main advantage of using NAT in a home network?
A.
Increased bandwidth
B.
Enhanced security
C.
Simplified network configuration
D.
Direct access to the internet
Show solution
Solution
One of the main advantages of using NAT in a home network is enhanced security, as it hides internal IP addresses from external networks.
Correct Answer:
B
— Enhanced security
Learn More →
Q. What is the main advantage of using OSPF over EIGRP?
A.
Faster convergence
B.
Less bandwidth usage
C.
Scalability
D.
Simplicity of configuration
Show solution
Solution
OSPF is generally considered more scalable than EIGRP, especially in larger networks, due to its hierarchical design and area segmentation.
Correct Answer:
C
— Scalability
Learn More →
Q. What is the main disadvantage of using NAT?
A.
It simplifies network configuration
B.
It can complicate certain protocols that require end-to-end connectivity
C.
It enhances security
D.
It allows for IP address conservation
Show solution
Solution
The main disadvantage of NAT is that it can complicate protocols that require end-to-end connectivity, such as VoIP and some peer-to-peer applications.
Correct Answer:
B
— It can complicate certain protocols that require end-to-end connectivity
Learn More →
Q. What is the main function of a network intrusion detection system (NIDS)?
A.
To block unauthorized access
B.
To monitor network traffic for suspicious activity
C.
To manage IP addresses
D.
To encrypt data
Show solution
Solution
A network intrusion detection system (NIDS) monitors network traffic for suspicious activity and potential threats.
Correct Answer:
B
— To monitor network traffic for suspicious activity
Learn More →
Q. What is the main function of a router in a TCP/IP network?
A.
To connect devices within the same network
B.
To forward packets between different networks
C.
To encrypt data packets
D.
To manage bandwidth
Show solution
Solution
A router's main function is to forward packets between different networks, determining the best path for data transmission.
Correct Answer:
B
— To forward packets between different networks
Learn More →
Q. What is the main function of an Intrusion Detection System (IDS)?
A.
To block unauthorized access
B.
To monitor network traffic for suspicious activity
C.
To encrypt data
D.
To manage IP addresses
Show solution
Solution
An Intrusion Detection System (IDS) monitors network traffic for suspicious activity and alerts administrators.
Correct Answer:
B
— To monitor network traffic for suspicious activity
Learn More →
Q. What is the main purpose of a router in a WAN?
A.
To connect devices within a local network
B.
To filter traffic based on MAC addresses
C.
To route data packets between different networks
D.
To provide wireless connectivity
Show solution
Solution
Routers are used in WANs to route data packets between different networks, making them essential for inter-network communication.
Correct Answer:
C
— To route data packets between different networks
Learn More →
Q. What is the main purpose of error control in networking?
A.
To increase bandwidth
B.
To ensure data integrity during transmission
C.
To manage network traffic
D.
To provide encryption
Show solution
Solution
The main purpose of error control is to ensure data integrity during transmission by detecting and correcting errors.
Correct Answer:
B
— To ensure data integrity during transmission
Learn More →
Q. What is the main reason NAT is used in home networks?
A.
To improve internet speed
B.
To allow multiple devices to access the internet using one IP address
C.
To provide a direct connection to the internet
D.
To enable wireless connectivity
Show solution
Solution
NAT is primarily used in home networks to allow multiple devices to access the internet using one public IP address, conserving IP address space.
Correct Answer:
B
— To allow multiple devices to access the internet using one IP address
Learn More →
Q. What is the maximum data rate of 802.11ac Wi-Fi technology?
A.
54 Mbps
B.
600 Mbps
C.
1.3 Gbps
D.
3.5 Gbps
Show solution
Solution
The maximum data rate of 802.11ac can reach up to 1.3 Gbps under optimal conditions.
Correct Answer:
C
— 1.3 Gbps
Learn More →
Q. What is the maximum data rate of the 802.11ac Wi-Fi standard?
A.
54 Mbps
B.
600 Mbps
C.
1.3 Gbps
D.
3.5 Gbps
Show solution
Solution
The 802.11ac standard can achieve maximum data rates of up to 1.3 Gbps under optimal conditions.
Correct Answer:
C
— 1.3 Gbps
Learn More →
Q. What is the maximum distance for a typical WAN connection using fiber optics?
A.
Up to 1 km
B.
Up to 10 km
C.
Up to 100 km
D.
Over 100 km
Show solution
Solution
Fiber optics can support WAN connections over distances greater than 100 km, making them suitable for long-range communication.
Correct Answer:
D
— Over 100 km
Learn More →
Q. What is the maximum hop count for RIP?
Show solution
Solution
The maximum hop count for RIP is 15; a hop count of 16 is considered unreachable.
Correct Answer:
B
— 15
Learn More →
Showing 31 to 60 of 237 (8 Pages)