Q. Which of the following is a connectionless protocol in TCP/IP?
A.
TCP
B.
UDP
C.
HTTP
D.
FTP
Show solution
Solution
UDP (User Datagram Protocol) is a connectionless protocol, meaning it does not establish a connection before sending data.
Correct Answer:
B
— UDP
Learn More →
Q. Which of the following is a disadvantage of using wireless networks?
A.
Higher installation costs
B.
Limited mobility
C.
Interference from other devices
D.
Faster data transfer rates
Show solution
Solution
One of the disadvantages of wireless networks is that they can experience interference from other devices, which can affect performance.
Correct Answer:
C
— Interference from other devices
Learn More →
Q. Which of the following is a disadvantage of using wireless technology?
A.
Higher installation costs
B.
Limited mobility
C.
Interference from other devices
D.
Faster data transfer rates
Show solution
Solution
One of the disadvantages of wireless technology is interference from other devices, which can affect the quality and reliability of the connection.
Correct Answer:
C
— Interference from other devices
Learn More →
Q. Which of the following is a disadvantage of wireless networks?
A.
Higher installation costs
B.
Limited mobility
C.
Interference from other devices
D.
Faster data transfer rates
Show solution
Solution
Wireless networks can suffer from interference from other devices, which can affect performance and reliability.
Correct Answer:
C
— Interference from other devices
Learn More →
Q. Which of the following is a key feature of IPv6?
A.
NAT (Network Address Translation)
B.
Stateless Address Autoconfiguration (SLAAC)
C.
Broadcast communication
D.
IPv4 compatibility
Show solution
Solution
Stateless Address Autoconfiguration (SLAAC) is a key feature of IPv6 that allows devices to automatically configure their own IP addresses without the need for a DHCP server.
Correct Answer:
B
— Stateless Address Autoconfiguration (SLAAC)
Learn More →
Q. Which of the following is a key feature of IPv6?
A.
NAT (Network Address Translation)
B.
Stateless Address Autoconfiguration (SLAAC)
C.
Broadcast communication
D.
IPv4 compatibility
Show solution
Solution
Stateless Address Autoconfiguration (SLAAC) is a key feature of IPv6 that allows devices to automatically configure their own IP addresses without the need for a DHCP server.
Correct Answer:
B
— Stateless Address Autoconfiguration (SLAAC)
Learn More →
Q. Which of the following is a key feature of IPv6?
A.
NAT (Network Address Translation)
B.
Stateless Address Autoconfiguration (SLAAC)
C.
Broadcast communication
D.
IPv4 compatibility
Show solution
Solution
Stateless Address Autoconfiguration (SLAAC) is a key feature of IPv6 that allows devices to automatically configure their own IP addresses without the need for a DHCP server.
Correct Answer:
B
— Stateless Address Autoconfiguration (SLAAC)
Learn More →
Q. Which of the following is a method of error control in data transmission?
A.
Checksum
B.
Encryption
C.
Compression
D.
Segmentation
Show solution
Solution
Checksum is a method of error control that helps detect errors in data transmission by adding a value based on the data being sent.
Correct Answer:
A
— Checksum
Learn More →
Q. Which of the following is a method of error control?
A.
Checksum
B.
Encryption
C.
Compression
D.
Segmentation
Show solution
Solution
Checksum is a method of error control used to detect errors in data transmission.
Correct Answer:
A
— Checksum
Learn More →
Q. Which of the following is a valid private IP address?
A.
192.168.1.1
B.
172.16.0.1
C.
10.0.0.1
D.
All of the above
Show solution
Solution
All listed IP addresses are private IP addresses as defined by RFC 1918.
Correct Answer:
D
— All of the above
Learn More →
Q. Which of the following is a valid subnet for the IP address 192.168.1.0?
A.
192.168.1.128/25
B.
192.168.1.256/24
C.
192.168.1.0/33
D.
192.168.1.0/24
Show solution
Solution
192.168.1.128/25 is a valid subnet, as it correctly divides the 192.168.1.0 network into two subnets, each with 128 addresses.
Correct Answer:
A
— 192.168.1.128/25
Learn More →
Q. Which of the following is NOT a benefit of using NAT?
A.
Conserves public IP addresses
B.
Provides an additional layer of security
C.
Improves network performance
D.
Allows for easier network management
Show solution
Solution
While NAT provides several benefits, it does not inherently improve network performance; it can sometimes introduce latency.
Correct Answer:
C
— Improves network performance
Learn More →
Q. Which of the following is NOT a feature of EIGRP?
A.
Fast convergence
B.
Support for IPv6
C.
Classful routing
D.
Load balancing
Show solution
Solution
EIGRP is a classless routing protocol, meaning it supports variable-length subnet masking (VLSM) and does not use classful routing.
Correct Answer:
C
— Classful routing
Learn More →
Q. Which of the following is NOT a feature of TCP?
A.
Connection-oriented
B.
Flow control
C.
Error detection and correction
D.
Broadcast transmission
Show solution
Solution
Broadcast transmission is not a feature of TCP; TCP is a connection-oriented protocol that ensures reliable communication.
Correct Answer:
D
— Broadcast transmission
Learn More →
Q. Which of the following is NOT a function of the Internet layer in TCP/IP?
A.
Routing packets
B.
Addressing hosts
C.
Error detection
D.
Fragmentation
Show solution
Solution
Error detection is not a primary function of the Internet layer; it is typically handled at the Transport layer.
Correct Answer:
C
— Error detection
Learn More →
Q. Which of the following is NOT a type of malware?
A.
Virus
B.
Trojan
C.
Firewall
D.
Worm
Show solution
Solution
A firewall is a security device, while virus, Trojan, and worm are types of malware.
Correct Answer:
C
— Firewall
Learn More →
Q. Which of the following is NOT a type of NAT?
A.
Static NAT
B.
Dynamic NAT
C.
NAT overload
D.
Virtual NAT
Show solution
Solution
Virtual NAT is not a recognized type of NAT; the common types are Static NAT, Dynamic NAT, and NAT overload (PAT).
Correct Answer:
D
— Virtual NAT
Learn More →
Q. Which of the following is NOT a type of network attack?
A.
Phishing
B.
DDoS
C.
Spoofing
D.
Routing
Show solution
Solution
Routing is not a type of network attack; it is a process of selecting paths in a network along which to send network traffic.
Correct Answer:
D
— Routing
Learn More →
Q. Which of the following is NOT a type of VLAN?
A.
Data VLAN
B.
Voice VLAN
C.
Management VLAN
D.
Control VLAN
Show solution
Solution
Control VLAN is not a recognized type of VLAN; the common types include Data VLAN, Voice VLAN, and Management VLAN.
Correct Answer:
D
— Control VLAN
Learn More →
Q. Which of the following is NOT a type of WAN technology?
A.
MPLS
B.
Frame Relay
C.
Ethernet
D.
Token Ring
Show solution
Solution
Token Ring is a LAN technology, while MPLS, Frame Relay, and Ethernet can be used in WAN environments.
Correct Answer:
D
— Token Ring
Learn More →
Q. Which of the following is NOT a valid class of IPv4 addresses?
A.
Class A
B.
Class B
C.
Class C
D.
Class D
Show solution
Solution
Class D is not a valid class for standard IPv4 addressing; it is reserved for multicast addresses.
Correct Answer:
D
— Class D
Learn More →
Q. Which of the following is NOT a valid IP address?
A.
192.168.1.1
B.
255.255.255.255
C.
300.1.1.1
D.
10.0.0.1
Show solution
Solution
300.1.1.1 is not a valid IP address because each octet must be in the range of 0-255.
Correct Answer:
C
— 300.1.1.1
Learn More →
Q. Which of the following is NOT a valid IPv6 address format?
A.
2001:0db8:85a3:0000:0000:8a2e:0370:7334
B.
2001:db8::ff00:42:8329
C.
192.168.1.1
D.
::1
Show solution
Solution
192.168.1.1 is an IPv4 address format, while the others are valid IPv6 address formats.
Correct Answer:
C
— 192.168.1.1
Learn More →
Q. Which of the following is NOT a valid IPv6 address format?
A.
2001:0db8:85a3:0000:0000:8a2e:0370:7334
B.
2001:db8::ff00:42:8329
C.
192.168.1.1
D.
::1
Show solution
Solution
192.168.1.1 is an IPv4 address format, while the others are valid IPv6 address formats.
Correct Answer:
C
— 192.168.1.1
Learn More →
Q. Which of the following is NOT a valid IPv6 address format?
A.
2001:0db8:85a3:0000:0000:8a2e:0370:7334
B.
2001:db8::ff00:42:8329
C.
192.168.1.1
D.
::1
Show solution
Solution
192.168.1.1 is an IPv4 address format, while the others are valid IPv6 address formats.
Correct Answer:
C
— 192.168.1.1
Learn More →
Q. Which of the following NAT types allows for the mapping of a range of private IP addresses to a range of public IP addresses?
A.
Static NAT
B.
Dynamic NAT
C.
Port Address Translation (PAT)
D.
NAT overload
Show solution
Solution
Dynamic NAT allows for the mapping of a range of private IP addresses to a range of public IP addresses, providing more flexibility than static NAT.
Correct Answer:
B
— Dynamic NAT
Learn More →
Q. Which of the following protocols is used for exchanging routing information between different autonomous systems?
A.
OSPF
B.
BGP
C.
RIP
D.
EIGRP
Show solution
Solution
BGP (Border Gateway Protocol) is used for exchanging routing information between different autonomous systems.
Correct Answer:
B
— BGP
Learn More →
Q. Which of the following protocols is used for reliable data transmission?
A.
UDP
B.
TCP
C.
ICMP
D.
ARP
Show solution
Solution
TCP (Transmission Control Protocol) is used for reliable data transmission, ensuring data is delivered accurately.
Correct Answer:
B
— TCP
Learn More →
Q. Which of the following protocols is used for remote access in WANs?
A.
Telnet
B.
SMTP
C.
DNS
D.
DHCP
Show solution
Solution
Telnet is a protocol used for remote access to devices over a WAN, allowing users to manage devices from a distance.
Correct Answer:
A
— Telnet
Learn More →
Q. Which of the following protocols is used for secure data transmission over the internet?
A.
HTTP
B.
FTP
C.
HTTPS
D.
SMTP
Show solution
Solution
HTTPS (Hypertext Transfer Protocol Secure) is used for secure data transmission over the internet.
Correct Answer:
C
— HTTPS
Learn More →
Showing 181 to 210 of 237 (8 Pages)