Search
Question: What is the primary benefit of using VLSM (Variable Length Subnet Masking)?Options: Simpli..
Question: If a network has a subnet mask of /22, how many hosts can it support?Options: 102210242046..
Question: What is the maximum number of subnets that can be created from a Class C network with a de..
Question: Which of the following is a valid subnet for the IP address 192.168.1.0?Options: 192.168.1..
Question: What does CIDR stand for in the context of subnetting?Options: Classless Inter-Domain Rout..
Question: In STP, what is the purpose of the port states?Options: To define the speed of the portTo ..
Question: Which version of Spanning Tree Protocol is an improvement over the original IEEE 802.1D?Op..
Question: What is the default bridge priority value in Spanning Tree Protocol?Options: 0327686553540..
Question: What happens to redundant links in a network using Spanning Tree Protocol?Options: They ar..
Question: Which protocol is used to elect the Root Bridge in STP?Options: Bridge Protocol Data Unit ..
Question: What is the role of the Root Bridge in Spanning Tree Protocol?Options: To forward all traf..
Question: What algorithm does the Spanning Tree Protocol use to determine the best path?Options: Dij..
Question: Which layer of the OSI model does the Spanning Tree Protocol operate at?Options: Data Link..
Question: What is the primary purpose of the Spanning Tree Protocol (STP)?Options: To prevent loops ..
Question: What is the purpose of using VLANs in network security?Options: To increase network speedT..
Question: Which type of attack involves intercepting and altering communications between two parties..
Question: What is the primary role of the Network Layer in the OSI model regarding security?Options:..
Question: Which of the following is a common method of error control in data transmission?Options: C..
Question: What is the function of a VPN in network security?Options: To increase bandwidthTo create ..
Question: Which protocol is commonly used for secure data transmission over the Internet?Options: HT..
Question: What does the term \'encryption\' refer to in network security?Options: The process of com..
Question: In the TCP/IP model, which layer is responsible for ensuring reliable data transmission?Op..
Question: What is the primary purpose of a firewall in network security?Options: To increase network..
Question: Which layer of the OSI model is primarily responsible for data encryption and decryption?O..
Question: Which transmission medium is most commonly used for high-speed internet connections?Option..
Question: What is the main purpose of error control in networking?Options: To increase bandwidthTo e..
Question: Which of the following is a characteristic of a switch?Options: Operates at the Network La..
Question: What is the purpose of subnetting?Options: To increase the size of a networkTo improve net..
Question: Which layer of the OSI model does IP operate at?Options: Application LayerTransport LayerN..
Question: What is the primary function of a router?Options: To connect devices within the same netwo..