Networking

Download Q&A
Q. Which IPv6 address type is used for multicast communication?
  • A. Global unicast address
  • B. Link-local address
  • C. Multicast address
  • D. Anycast address
Q. Which layer of the OSI model does IP operate at?
  • A. Application Layer
  • B. Transport Layer
  • C. Network Layer
  • D. Data Link Layer
Q. Which layer of the OSI model does IP routing operate at?
  • A. Application layer
  • B. Transport layer
  • C. Network layer
  • D. Data link layer
Q. Which layer of the OSI model does the IP protocol operate at?
  • A. Application Layer
  • B. Transport Layer
  • C. Network Layer
  • D. Physical Layer
Q. Which layer of the OSI model does the Spanning Tree Protocol operate at?
  • A. Data Link Layer
  • B. Network Layer
  • C. Transport Layer
  • D. Application Layer
Q. Which layer of the OSI model handles the physical connection between devices?
  • A. Application Layer
  • B. Transport Layer
  • C. Network Layer
  • D. Physical Layer
Q. Which layer of the OSI model is primarily responsible for data encryption and decryption?
  • A. Application Layer
  • B. Presentation Layer
  • C. Session Layer
  • D. Transport Layer
Q. Which layer of the TCP/IP model corresponds to the OSI model's Data Link layer?
  • A. Application layer
  • B. Transport layer
  • C. Internet layer
  • D. Network interface layer
Q. Which layer of the TCP/IP model is responsible for end-to-end communication and error recovery?
  • A. Application Layer
  • B. Transport Layer
  • C. Internet Layer
  • D. Network Access Layer
Q. Which layer of the TCP/IP model is responsible for end-to-end communication?
  • A. Application layer
  • B. Transport layer
  • C. Internet layer
  • D. Network interface layer
Q. Which of the following IP addresses belongs to the subnet 10.0.0.0/8?
  • A. 10.1.1.1
  • B. 192.168.1.1
  • C. 172.16.0.1
  • D. 10.255.255.255
Q. Which of the following is a benefit of using IPv6 over IPv4?
  • A. Reduced packet size
  • B. Improved routing efficiency
  • C. Increased security through mandatory IPsec
  • D. Lower latency
Q. Which of the following is a characteristic of a peer-to-peer network?
  • A. Centralized control
  • B. Scalability
  • C. Decentralized control
  • D. High cost
Q. Which of the following is a characteristic of a router?
  • A. Operates at the Data Link Layer
  • B. Forwards data based on MAC addresses
  • C. Connects different networks
  • D. Uses circuit switching
Q. Which of the following is a characteristic of a switch?
  • A. Operates at the Network Layer
  • B. Forwards data based on MAC addresses
  • C. Connects different networks
  • D. Provides IP addressing
Q. Which of the following is a characteristic of a trunk port?
  • A. Carries traffic for a single VLAN
  • B. Is used to connect end devices
  • C. Carries traffic for multiple VLANs
  • D. Is always configured as access mode
Q. Which of the following is a characteristic of OSPF?
  • A. Uses hop count as a metric
  • B. Supports VLSM and CIDR
  • C. Is a distance vector protocol
  • D. Sends updates every 30 seconds
Q. Which of the following is a characteristic of static routing?
  • A. Automatically adjusts to network changes
  • B. Requires manual configuration
  • C. Uses routing protocols to find paths
  • D. Is less secure than dynamic routing
Q. Which of the following is a characteristic of the Internet Protocol (IP)?
  • A. It provides error recovery
  • B. It is connection-oriented
  • C. It routes packets across networks
  • D. It encrypts data
Q. Which of the following is a characteristic of UDP?
  • A. Connection-oriented
  • B. Reliable delivery
  • C. Low latency
  • D. Error correction
Q. Which of the following is a characteristic of VLANs?
  • A. They require a dedicated physical switch
  • B. They can span multiple switches
  • C. They operate only at Layer 1 of the OSI model
  • D. They are limited to 10 devices
Q. Which of the following is a characteristic of WAN transmission media?
  • A. High bandwidth and low latency
  • B. Limited distance and high cost
  • C. Long distance and variable bandwidth
  • D. Only wired connections
Q. Which of the following is a classful IP address?
  • A. 192.168.1.1
  • B. 10.0.0.1
  • C. 172.16.0.1
  • D. All of the above
Q. Which of the following is a common dynamic routing protocol?
  • A. RIP
  • B. HTTP
  • C. FTP
  • D. Telnet
Q. Which of the following is a common frequency band used by Wi-Fi networks?
  • A. 2.4 GHz
  • B. 5.0 GHz
  • C. Both 2.4 GHz and 5.0 GHz
  • D. 1.2 GHz
Q. Which of the following is a common method for securing wireless networks?
  • A. WEP
  • B. HTTP
  • C. FTP
  • D. SMTP
Q. Which of the following is a common method of error control in data transmission?
  • A. Checksum
  • B. Compression
  • C. Encryption
  • D. Segmentation
Q. Which of the following is a common method of securing wireless networks?
  • A. WEP
  • B. FTP
  • C. HTTP
  • D. SMTP
Q. Which of the following is a common security protocol used in wireless networks?
  • A. WEP
  • B. SMTP
  • C. IPSec
  • D. FTP
Q. Which of the following is a common variant of the Spanning Tree Protocol?
  • A. Rapid Spanning Tree Protocol (RSTP)
  • B. Enhanced Spanning Tree Protocol (ESTP)
  • C. Dynamic Spanning Tree Protocol (DSTP)
  • D. Static Spanning Tree Protocol (SSTP)
Showing 151 to 180 of 237 (8 Pages)
Soulshift Feedback ×

On a scale of 0–10, how likely are you to recommend The Soulshift Academy?

Not likely Very likely