Q. How does a switch handle VLAN tagging?
-
A.
By using MAC addresses
-
B.
By using IP addresses
-
C.
By using 802.1Q tags
-
D.
By using ARP requests
Solution
Switches use 802.1Q tags to identify VLANs, allowing them to properly forward frames to the correct VLAN.
Correct Answer:
C
— By using 802.1Q tags
Learn More →
Q. How does IPv6 handle packet fragmentation?
-
A.
Only the sender can fragment packets
-
B.
Intermediate routers can fragment packets
-
C.
Fragmentation is not allowed in IPv6
-
D.
Fragmentation is handled by NAT
Solution
In IPv6, only the sender is responsible for fragmenting packets, as routers do not perform fragmentation.
Correct Answer:
A
— Only the sender can fragment packets
Learn More →
Q. How does IPv6 handle packet fragmentation?
-
A.
Only the sender can fragment packets
-
B.
Intermediate routers can fragment packets
-
C.
Fragmentation is not allowed in IPv6
-
D.
Fragmentation is handled by NAT
Solution
In IPv6, only the sender is responsible for fragmenting packets, as routers do not perform fragmentation.
Correct Answer:
A
— Only the sender can fragment packets
Learn More →
Q. How does IPv6 handle packet fragmentation?
-
A.
Only the sender can fragment packets
-
B.
Intermediate routers can fragment packets
-
C.
Fragmentation is not allowed in IPv6
-
D.
Fragmentation is handled by NAT
Solution
In IPv6, only the sender is responsible for fragmenting packets, as routers do not perform fragmentation.
Correct Answer:
A
— Only the sender can fragment packets
Learn More →
Q. How does NAT affect the use of IPsec?
-
A.
It has no effect on IPsec
-
B.
It can break IPsec connections
-
C.
It enhances IPsec security
-
D.
It simplifies IPsec configuration
Solution
NAT can break IPsec connections because it modifies packet headers, which can interfere with the integrity checks performed by IPsec.
Correct Answer:
B
— It can break IPsec connections
Learn More →
Q. How many subnets can be created from a Class C network using a /28 subnet mask?
Solution
A /28 subnet mask allows for 16 subnets (2^(28-24)), as Class C networks have a default mask of /24.
Correct Answer:
C
— 16
Learn More →
Q. If a network has a subnet mask of /22, how many hosts can it support?
-
A.
1022
-
B.
1024
-
C.
2046
-
D.
2048
Solution
A /22 subnet mask allows for 2^(32-22) = 1024 total addresses, minus 2 for network and broadcast addresses, resulting in 1022 usable hosts.
Correct Answer:
C
— 2046
Learn More →
Q. In OSPF, what is the purpose of the Area ID?
-
A.
To identify the router
-
B.
To segment the network
-
C.
To define the metric
-
D.
To establish neighbor relationships
Solution
The Area ID in OSPF is used to segment the network into areas, which helps in reducing routing table size and improving efficiency.
Correct Answer:
B
— To segment the network
Learn More →
Q. In STP, what is the purpose of the port states?
-
A.
To define the speed of the port
-
B.
To determine the role of the port in the topology
-
C.
To manage IP address assignments
-
D.
To encrypt data on the port
Solution
Port states in STP (Blocking, Listening, Learning, Forwarding) determine the role of the port in the network topology.
Correct Answer:
B
— To determine the role of the port in the topology
Learn More →
Q. In STP, what is the significance of the Bridge ID?
-
A.
It uniquely identifies a switch in the network
-
B.
It determines the speed of the connection
-
C.
It manages VLAN assignments
-
D.
It encrypts the data packets
Solution
The Bridge ID uniquely identifies a switch in the network and is used in the STP calculations.
Correct Answer:
A
— It uniquely identifies a switch in the network
Learn More →
Q. In STP, which device is elected as the root bridge?
-
A.
The device with the highest MAC address
-
B.
The device with the lowest MAC address
-
C.
The device with the highest bandwidth
-
D.
The device with the lowest bridge ID
Solution
The root bridge is elected based on the lowest bridge ID, which is a combination of bridge priority and MAC address.
Correct Answer:
D
— The device with the lowest bridge ID
Learn More →
Q. In subnetting, what does the term 'supernetting' refer to?
-
A.
Combining multiple subnets into a larger network
-
B.
Dividing a network into smaller subnets
-
C.
Changing the subnet mask
-
D.
None of the above
Solution
Supernetting refers to the practice of combining multiple smaller subnets into a larger network to reduce the size of routing tables.
Correct Answer:
A
— Combining multiple subnets into a larger network
Learn More →
Q. In TCP/IP, which layer corresponds to the OSI Network Layer?
-
A.
Application Layer
-
B.
Transport Layer
-
C.
Internet Layer
-
D.
Link Layer
Solution
In the TCP/IP model, the Internet Layer corresponds to the OSI Network Layer, handling routing and addressing.
Correct Answer:
C
— Internet Layer
Learn More →
Q. In the TCP/IP model, which layer is responsible for ensuring reliable data transmission?
-
A.
Application Layer
-
B.
Transport Layer
-
C.
Internet Layer
-
D.
Network Access Layer
Solution
The Transport Layer in the TCP/IP model is responsible for ensuring reliable data transmission through protocols like TCP.
Correct Answer:
B
— Transport Layer
Learn More →
Q. In which layer of the OSI model does IP routing operate?
-
A.
Application layer
-
B.
Transport layer
-
C.
Network layer
-
D.
Data link layer
Solution
IP routing operates at the Network layer (Layer 3) of the OSI model.
Correct Answer:
C
— Network layer
Learn More →
Q. In which layer of the OSI model does NAT primarily operate?
-
A.
Application layer
-
B.
Transport layer
-
C.
Network layer
-
D.
Data link layer
Solution
NAT primarily operates at the Network layer (Layer 3) of the OSI model, where it modifies the IP address information in packet headers.
Correct Answer:
C
— Network layer
Learn More →
Q. In which layer of the OSI model does the TCP protocol operate?
-
A.
Application Layer
-
B.
Transport Layer
-
C.
Network Layer
-
D.
Session Layer
Solution
TCP (Transmission Control Protocol) operates at the Transport Layer (Layer 4) of the OSI model.
Correct Answer:
B
— Transport Layer
Learn More →
Q. What algorithm does the Spanning Tree Protocol use to determine the best path?
-
A.
Dijkstra's Algorithm
-
B.
Bellman-Ford Algorithm
-
C.
Spanning Tree Algorithm
-
D.
Flooding Algorithm
Solution
STP uses the Spanning Tree Algorithm to determine the best path and eliminate loops.
Correct Answer:
C
— Spanning Tree Algorithm
Learn More →
Q. What does a router use to make forwarding decisions?
-
A.
MAC address table
-
B.
Routing table
-
C.
ARP cache
-
D.
DNS records
Solution
A router uses a routing table to make forwarding decisions based on the destination IP address of packets.
Correct Answer:
B
— Routing table
Learn More →
Q. What does a router use to make routing decisions?
-
A.
MAC addresses
-
B.
IP addresses
-
C.
Port numbers
-
D.
DNS records
Solution
Routers use IP addresses to make routing decisions and determine the best path for data packets.
Correct Answer:
B
— IP addresses
Learn More →
Q. What does a subnet mask do?
-
A.
Defines the size of the network
-
B.
Encrypts data packets
-
C.
Assigns IP addresses
-
D.
Routes data packets
Solution
A subnet mask defines the size of the network and determines which portion of an IP address refers to the network and which part refers to the host.
Correct Answer:
A
— Defines the size of the network
Learn More →
Q. What does CIDR stand for in the context of subnetting?
-
A.
Classless Inter-Domain Routing
-
B.
Classful Inter-Domain Routing
-
C.
Common Inter-Domain Routing
-
D.
Centralized Inter-Domain Routing
Solution
CIDR stands for Classless Inter-Domain Routing, which allows for more flexible allocation of IP addresses than traditional classful addressing.
Correct Answer:
A
— Classless Inter-Domain Routing
Learn More →
Q. What does the '::' notation in IPv6 addresses signify?
-
A.
A subnet mask
-
B.
A loopback address
-
C.
A shorthand for consecutive zero blocks
-
D.
A reserved address
Solution
'::' is a shorthand notation in IPv6 that represents consecutive blocks of zeros in an address.
Correct Answer:
C
— A shorthand for consecutive zero blocks
Learn More →
Q. What does the '::' notation in IPv6 represent?
-
A.
A single zero
-
B.
A group of four zeros
-
C.
A series of consecutive zeros
-
D.
An invalid address
Solution
'::' notation in IPv6 is used to represent a series of consecutive zeros in the address, allowing for a more compact representation.
Correct Answer:
C
— A series of consecutive zeros
Learn More →
Q. What does the subnet mask 255.255.255.0 indicate?
-
A.
A Class A network
-
B.
A Class B network
-
C.
A Class C network
-
D.
A Class D network
Solution
The subnet mask 255.255.255.0 indicates a Class C network.
Correct Answer:
C
— A Class C network
Learn More →
Q. What does the term 'encryption' refer to in network security?
-
A.
The process of compressing data
-
B.
The process of converting data into a coded format
-
C.
The process of backing up data
-
D.
The process of deleting data
Solution
Encryption is the process of converting data into a coded format to prevent unauthorized access.
Correct Answer:
B
— The process of converting data into a coded format
Learn More →
Q. What does the term 'handoff' refer to in wireless communication?
-
A.
Switching between different frequency bands
-
B.
Transferring a call from one cell tower to another
-
C.
Changing the encryption method
-
D.
Adjusting the transmission power
Solution
Handoff refers to the process of transferring an active call or data session from one cell tower to another as a user moves through the coverage area.
Correct Answer:
B
— Transferring a call from one cell tower to another
Learn More →
Q. What does the term 'VPN' stand for in network security?
-
A.
Virtual Private Network
-
B.
Virtual Public Network
-
C.
Variable Private Network
-
D.
Virtual Protected Network
Solution
VPN stands for Virtual Private Network, which creates a secure connection over a less secure network, such as the Internet.
Correct Answer:
A
— Virtual Private Network
Learn More →
Q. What happens to ports in a switch that are in a blocking state in STP?
-
A.
They forward traffic
-
B.
They drop traffic
-
C.
They listen for BPDUs
-
D.
They become active
Solution
Ports in a blocking state do not forward traffic; they drop it to prevent loops.
Correct Answer:
B
— They drop traffic
Learn More →
Q. What happens to redundant links in a network using Spanning Tree Protocol?
-
A.
They are utilized for load balancing
-
B.
They are blocked to prevent loops
-
C.
They are automatically configured
-
D.
They are converted to trunk links
Solution
Redundant links are blocked in STP to prevent loops while still allowing for failover if the active link fails.
Correct Answer:
B
— They are blocked to prevent loops
Learn More →
Showing 1 to 30 of 237 (8 Pages)