Google News
logo
Networking - Quiz(MCQ)
A)
1961
B)
1965
C)
1970
D)
1977

Correct Answer :   1961


Explanation : The idea of ARPANET, one of the earliest computer networks, was proposed by Leonard Kleinrock in 1961, in his paper titled "Information Flow in Large Communication Nets."

A)
CNNET
B)
NSFNET
C)
ARPANET
D)
ASAPNET

Correct Answer :   ARPANET


Explanation : ARPANET was one of the first computer networks to use packet switching. Development of ARPANET started in 1966, and the first two nodes, UCLA and SRI (Standford Research Institute), were connected, officially starting ARPANET in 1969.

A)
ID
B)
RFC
C)
RCF
D)
DFC

Correct Answer :   RFC


Explanation : RFC stands for Request For Comments and they are documents that describe methods, behaviors, research, or innovations applicable to the working of the Internet.

A)
Added
B)
Removed
C)
Modified
D)
Rearranged

Correct Answer :   Added


Explanation : Each layer adds its own header to the packet from the previous layer. For example, in the Internet layer, the IP header is added over the TCP header on the data packet that came from the transport layer.

A)
128 bytes
B)
32 bits
C)
64 bits
D)
128 bits

Correct Answer :   128 bits


Explanation : An IPv6 address is 128 bits long.

A)
NAT
B)
PAT
C)
Static
D)
Dynamic

Correct Answer :   PAT


Explanation : Port Address Translation (PAT) allows a one-to-many approach to network address translation.

A)
IEEE and Extended
B)
Specialized and Standard
C)
Specialized and IEEE
D)
Standard and Extended

Correct Answer :   Standard and Extended


Explanation : Standard and extended Access Control Lists (ACLs) are used to configure security on a router.

A)
Struct
B)
Semantics
C)
Syntax
D)
Formatting

Correct Answer :   Syntax


Explanation : The structure and format of data are defined using syntax. Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. In programming languages, syntax of the instructions plays a vital role in designing of the program.

A)
Simplex
B)
Automatic
C)
Half-duplex
D)
Full-duplex

Correct Answer :   Simplex


Explanation : In simplex transmission, data flows in single direction which in this case refers to the data flowing from the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to the computer only.

A)
config
B)
config mem
C)
copy running backup
D)
copy running-config startup-config

Correct Answer :   copy running-config startup-config


Explanation : The command to back up the configuration on a router is copy running-config startup-config.

A)
100 kbps
B)
1 Mbps
C)
2 Mbps
D)
10 Mbps

Correct Answer :   10 Mbps


Explanation : Each device has 10 Mbps to the server.

A)
A
B)
G
C)
B
D)
N

Correct Answer :   G


Explanation : IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz range, with a top speed of 54Mbps.

A)
Acts as the fastest port to all servers.
B)
Provides multiple collision domains on one switch port.
C)
Breaks up broadcast domains in a layer 2 switch internetwork.
D)
Provides multiple broadcast domains within a single collision domain.

Correct Answer :   Breaks up broadcast domains in a layer 2 switch internetwork.


Explanation : VLANs break up broadcast domains at layer 2.

A)
IP
B)
UDP
C)
ARP
D)
TCP

Correct Answer :   UDP


Explanation : User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service.

A)
Distributed system
B)
Networking system
C)
Mail system
D)
Computer network

Correct Answer :   Distributed system


Explanation :

A Computer network is defined as a collection of interconnected computers which uses a single technology for connection.

A distributed system is also the same as computer network but the main difference is that the whole collection of computers appears to its users as a single coherent system.

Example : World wide web

A)
a process is running on both devices
B)
a process is active and another is inactive
C)
PIDs of the processes running of different devices are same
D)
a process in one device is able to exchange information with a process in another device

Correct Answer :   a process in one device is able to exchange information with a process in another device


Explanation : A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes. The nodes have certain processes which enable them to share a specific type of data using a distinct protocol.

A)
show interface
B)
show access-lists
C)
show ip interface
D)
show interface access-lists

Correct Answer :   show ip interface


Explanation : The show ip interface command will show you if any outbound or inbound interfaces have an access list set.

A)
Physical layer
B)
Data Link layer
C)
Session layer
D)
Application layer

Correct Answer :   Physical layer


Explanation : Hubs regenerate electrical signals, which are specified at the Physical layer.

A)
chief network
B)
overlay network
C)
prior network
D)
prime network

Correct Answer :   overlay network


Explanation : An overlay network is a computer network that is built on top of another network. Some examples of an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer Networks (P2P).

A)
The computer that routes the data
B)
The computer that originates the data
C)
The computer that terminates the data
D)
All of the Above

Correct Answer :   All of the Above


Explanation : In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.

A)
unicast network
B)
broadcast network
C)
multicast network
D)
anycast network

Correct Answer :   broadcast network


Explanation : In a broadcast network, information is sent to all stations in a network whereas in a multicast network the data or information is sent to a group of stations in the network. In unicast network, information is sent to only one specific station. The broadcast address of the network is the last assigned address of the network.

A)
Every 30 seconds
B)
Every 10 minutes
C)
Every 2 seconds
D)
Never

Correct Answer :   Every 2 seconds


Explanation : Every 2 seconds, BPDUs are sent out from all active bridge ports by default.

A)
1
B)
2
C)
5
D)
10

Correct Answer :   1


Explanation : By default, switches break up collision domains but are one large broadcast domain.

A)
A low-speed downstream channel
B)
A high-speed downstream channel
C)
A medium-speed downstream channel
D)
An ultra-high speed downstream channel

Correct Answer :   A low-speed downstream channel


Explanation : A low-speed downstream channel is not a constituent of a residential telephone line. But it might be just a two-way telephone channel. Internet can be provided through a high-speed downstream channel in a residential telephone line.

A)
ISP
B)
Wired phone access
C)
Network routing and ISP
D)
Wired phone access and ISP

Correct Answer :   Wired phone access and ISP


Explanation : DSL stands for Digital Subscriber Line and ISP stands for Internet Service Provider. In a Digital Subscriber Line system, the same company which provides phone connection is also an ISP. The internet is provided through the pre-installed telephone lines.

A)
Amplify digital signals
B)
Convert analog signals into digital signals
C)
De-amplify digital signals
D)
Convert digital signals into analog signals

Correct Answer :   Convert analog signals into digital signals


Explanation : DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used by Telcos to convert the analog signals to digital signals for the purpose of providing internet. The DSLAM located in a telco’s Central Office does this function.

A)
CO
B)
Splitter
C)
CMTS
D)
DSLAM

Correct Answer :   CMTS


Explanation : CMTS stands for Cable Modem Termination System. It is used in cable internet access. In cable internet access, internet is not provided through telephone lines and the companies that provide such connections don’t necessarily provide telephone access.

A)
NCP
B)
LCP
C)
X.25
D)
HDLC

Correct Answer :   LCP


Explanation : Link Control Protocol in the PPP stack provides dynamic addressing, authentication, and multilink.

A)
A network that has only one entry and exit point.
B)
A network with more than one exit point.
C)
A network with only one entry and no exit point.
D)
A network with more than one exit and entry point.

Correct Answer :   A network that has only one entry and exit point.


Explanation : Stub networks have only one connection to an internetwork. Only default routes can be set on a stub network or network loops may occur.

A)
RouterA(config)#bandwidth 64
B)
RouterA(config-if)#clock rate 64
C)
RouterA(config-if)#bandwidth 64000
D)
RouterA(config-if)#clock rate 64000

Correct Answer :   RouterA(config-if)#clock rate 64000


Explanation : The clock rate command is two words, and the speed of the line is in bps.

A)
Two VLANs are configured by default on all Cisco switches.
B)
You should not have more than 10 switches in the same VTP domain.
C)
VTP is used to send VLAN information to switches in a configured VTP domain.
D)
VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed.

Correct Answer :   VTP is used to send VLAN information to switches in a configured VTP domain.


Explanation : Switches do not propagate VLAN information by default; you must configure the VTP domain. VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link.

A)
12
B)
10
C)
8
D)
6

Correct Answer :   12


Explanation : Layer 2 switching creates individual collision domains.

A)
sh pvc
B)
show interface
C)
show run
D)
show frame-relay pvc

Correct Answer :   show interface


Explanation : The show interface command shows the line, protocol, DLCI, and LMI information of an interface.

A)
TCP
B)
ICMP
C)
ARP
D)
BootP

Correct Answer :   ICMP


Explanation : ICMP is the protocol at the Network layer that is used to send echo requests and replies.

A)
10
B)
8
C)
6
D)
5

Correct Answer :   5


Explanation : There are five layers in the Internet Protocol stack. The five layers in Internet Protocol stack is Application, Transport, Network, Data link and Physical layer. The internet protocol stack model is also called the TCP/IP model and it’s used in modern Internet Communication.

A)
5
B)
6
C)
7
D)
10

Correct Answer :   7


Explanation : The seven layers in ISO OSI reference model is Application, Presentation, Session, Transport, Network, Data link and Physical layer. OSI stands for Open System Interconnect and it is a generalized model.

A)
Session layer
B)
Application layer
C)
Presentation layer
D)
Session and Presentation layer

Correct Answer :   Session and Presentation layer


Explanation : The only difference between OSI model and TCP/IP model is that the functions of Presentation and Session layer in the OSI model are handled by the transport layer itself in TCP/IP. OSI is a generalized model and TCP/IP is an application specific model.

A)
End system
B)
NIC
C)
Ethernet
D)
Packet transport

Correct Answer :   End system


Explanation : Not only application layer, but presentation layer, session layer and transport layer are also implemented in the end system. The layers below are implemented outside the end system, for example, the network layer is implemented on the routers and the physical layer is implemented for the medium.

A)
NIC
B)
End system
C)
Ethernet
D)
Signal Transmission

Correct Answer :   End system


Explanation : Application, Presentation, Session and Transport layer are implemented in the end system. The transport layer handles the process to process delivery of the packet through ports.

A)
Link layer
B)
Transport layer
C)
Session layer
D)
Application layer

Correct Answer :   Session layer


Explanation : In OSI reference model, the fifth layer is Session layer. Session layer provides the mechanism for opening, closing and managing a session between end-user application processes. In TCP/IP protocol stack, the functions of the session layer are handled by the transport layer itself and thus the session layer is missing from the TCP/IP model.

A)
config net
B)
copy tftp run
C)
copy tftp flash
D)
copy tftp start

Correct Answer :   copy tftp flash


Explanation : The copy tftp flash command places a new file in flash memory, which is the default location for the Cisco IOS in Cisco routers.

A)
erase nvram
B)
delete nvram
C)
erase running
D)
erase startup

Correct Answer :   erase startup


Explanation : The command erase startup-config deletes the configuration stored in NVRAM.

A)
open system interconnection
B)
open service Internet
C)
operating system interface
D)
optical service implementation

Correct Answer :   open system interconnection


Explanation : OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on how applications communicate over a network, which also helps us to have a structured plan for troubleshooting. It is recognized by the ISO as the generalized model for computer network i.e. it can be modified to design any kind of computer network.

A)
network layer
B)
session layer
C)
transport layer
D)
application layer

Correct Answer :   session layer


Explanation : In OSI reference model, there are two layers which are not present in TCP/IP model. They are Presentation and Session layer. The functions of Presentation and Session layer in the OSI model are handled by the transport layer itself in TCP/IP.

A)
Port address
B)
Specific address
C)
Physical address and logical address
D)
All of the above

Correct Answer :   All of the above


Explanation : The physical, logical, port and specific addresses are used in TCP/IP protocol. All the addressing schemes, that is physical (MAC) and logical address, port address and specific address are employed in both TCP/IP model and OSI model. In TCP/IP, the addresses are more focused on the internet implementation of these addresses.

A)
after
B)
prior to
C)
with no link to
D)
simultaneous to

Correct Answer :   prior to


Explanation : Several TCP/IP prototypes were developed at multiple research centers between 1978 and 1983, whereas OSI reference model was developed in the year 1984. TCP/IP was developed with the intention to create a model for the Internet while OSI was intended to be a general network model.

A)
192.168.168.128-190
B)
192.168.168.129-191
C)
192.168.168.129-190
D)
192.168.168.128-192

Correct Answer :   192.168.168.129-190


Explanation : 256 - 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129-190.

A)
copy flash tftp
B)
copy ios tftp
C)
copy tftp flash
D)
backup IOS disk

Correct Answer :   copy flash tftp


Explanation : The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.

A)
ARP
B)
TCP
C)
ICMP
D)
BootP

Correct Answer :   ICMP


Explanation : ICMP is the protocol at the Network layer that is used to send messages back to an originating router.

A)
local area network
B)
wide area network
C)
virtual private network
D)
personal area network

Correct Answer :   personal area network


Explanation : Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.

A)
hub
B)
bridge
C)
firewall
D)
router

Correct Answer :   router


Explanation : A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the cheapest path to the destination.

A)
Shut down the router.
B)
Set your console password.
C)
Set the Telnet password.
D)
Disable console connections.

Correct Answer :   Set your console password.


Explanation : The command line console 0 places you at a prompt where you can then set your console user-mode password.

A)
AON
B)
MON
C)
NON
D)
PON

Correct Answer :   AON


Explanation : AON stands for Active optical networks which are essentially switched Ethernets. Each user has his/her own dedicated optical fiber line connecting to the ISP in an AON.

A)
Cable access
B)
Telephone access
C)
Satellite access
D)
FTTH internet access

Correct Answer :   Satellite access


Explanation : StarBand was a two-way satellite broadband Internet service available in the U.S. from 2000–2015. It was discontinued from September 30 2015 due to increasing competition from other ISPs.

A)
DSL
B)
Cable
C)
FTTP
D)
All of the above

Correct Answer :   All of the above


Explanation : Home Internet Access is provided by DSL, FTTP, and Cable. FTTP provides the fastest speeds followed by the cable connections and then the DSLs. FTTP is popularly used in modern connections.

A)
HFC
B)
Twisted pair cable
C)
Optical cable
D)
High speed fibre cable

Correct Answer :   Optical cable


Explanation : ONT stands for Optical Network Terminal. The ONT connects to the Termination Point (TP) with an optical fibre cable. It translates light signals from the fibre optic line to electric signals that the router can read.

A)
Added
B)
Removed
C)
Rearranged
D)
Randomized

Correct Answer :   Removed


Explanation : In OSI reference model, when data packet moves from lower layers to higher layer, headers get removed. Whereas when the data packet moves from higher layer to lower layers, headers are added. These headers contain the essential control information for the protocols used on the specific layer.

A)
It is an application specific network model
B)
One layer may duplicate lower layer functionality
C)
A structured way to discuss and easier update system components
D)
Functionality at one layer no way requires information from another layer

Correct Answer :   Functionality at one layer no way requires information from another layer


Explanation : One layer may use the information from another layer, for example timestamp value. The information is contained in the header inserted by the previous layer. The headers are added as the packet moves from higher layers to the lower layers.

A)
port address
B)
logical address
C)
specific address
D)
physical address

Correct Answer :   port address


Explanation : A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. Some examples of port numbers are port 20 which is used for FTP data, port 22 which is used for SSH remote login ,and port 23 which is used for TELNET.

A)
in case of traffic overloading
B)
in case of transfer failure
C)
when a system terminates
D)
when connection between two nodes terminates

Correct Answer :   in case of traffic overloading


Explanation : Network congestion occurs when traffic in the network is more than the network could handle. To avoid network congestion, the network management uses various open-loop and closed-loop congestion control techniques.

A)
local area network
B)
storage area network
C)
virtual private network
D)
enterprise private network

Correct Answer :   virtual private network


Explanation : A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.VPN provides enhanced security and online anonymity to users on the internet. It is also used to unblock websites which are unavailable in certain regions.

A)
line con 0
B)
line vty 0 4
C)
line aux 0 4
D)
line telnet 0 4

Correct Answer :   line vty 0 4


Explanation : The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password.

63 .
Which of the following services use TCP?
1. DHCP
2. SMTP
3. HTTP
4. TFTP
5. FTP
A)
1 and 2
B)
2, 3 and 5
C)
1, 2 and 4
D)
1, 3 and 4

Correct Answer :   2, 3 and 5


Explaination : SMTP, HTTP and FTP use TCP.

A)
Internet
B)
Application
C)
Network Access
D)
Host-to-Host

Correct Answer :   Host-to-Host


Explanation : The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.

A)
Proxy ARP
B)
Gateway DP
C)
Inverse ARP (IARP)
D)
Reverse ARP (RARP)

Correct Answer :   Proxy ARP


Explanation : Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway.

A)
Internet
B)
Application
C)
Host-to-Host
D)
Network Access

Correct Answer :   Internet


Explanation : The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.

A)
159, 0x9F
B)
185, 0xB9
C)
157, 0x9D
D)
155, 0x9B

Correct Answer :   157, 0x9D


Explanation :

To turn a binary number into decimal, you just have to add the values of each bit that is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 128 + 16 + 8 + 4 + 1 = 157.
 
Hexadecimal is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F-16 characters total, from which to create all the numbers you'll ever need. So, if 1001 in binary is 9, then the hexadecimal equivalent is 9. Since we then have 1101, which is 13 in binary, the hexadecimal answer is D and the complete hexadecimal answer is 0x9D.

68 .
Which of the following are TCP/IP protocols used at the Application layer of the OSI model?
 
1. IP
2. TCP
3. Telnet
4. FTP
5. TFTP
A)
1 and 3
B)
1, 3 and 5
C)
1, 2 and 4
D)
3, 4 and 5

Correct Answer :   3, 4 and 5


Explaination : Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP) are all Application layer protocols. IP is a Network layer protocol. Transmission Control Protocol (TCP) is a Transport layer protocol.

69 .
Which of the following describe the DHCP Discover message?
 
1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
2. It uses UDP as the Transport layer protocol.
3. It uses TCP as the Transport layer protocol.
4. It does not use a layer 2 destination address.
A)
1 only
B)
1 and 2
C)
3 and 4
D)
4 only

Correct Answer :   1 and 2


Explaination : A client that sends out a DHCP Discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer 2 broadcast is all Fs in hex, or FF:FF:FF:FF:FF:FF. The layer 3 broadcast is 255.255.255.255, which means all networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also called the Host-to-Host layer.

A)
ARP
B)
DHCP
C)
SMTP
D)
SNMP

Correct Answer :   DHCP


Explanation : Dynamic Host Configuration Protocol (DHCP) is used to provide IP information to hosts on your network. DHCP can provide a lot of information, but the most common is IP address, subnet mask, default gateway, and DNS information.

A)
12.0.0.1
B)
172.15.14.36
C)
168.172.19.39
D)
192.168.24.43

Correct Answer :   192.168.24.43


Explanation : Class A private address range is 10.0.0.0 through 10.255.255.255. Class B private address range is 172.16.0.0 through 172.31.255.255, and Class C private address range is 192.168.0.0 through 192.168.255.255.

A)
Class A
B)
Class B
C)
Class C
D)
Class D

Correct Answer :   Class C


Explanation : A Class C network address has only 8 bits for defining hosts: 2² - 2 = 254.

73 .
Which statements are true regarding ICMP packets?
 
1. They acknowledge receipt of a TCP segment.
2. They guarantee datagram delivery.
3. They can provide hosts with information about network problems.
4. They are encapsulated within IP datagrams.
A)
3 and 4
B)
2 and 3
C)
2, 3 and 4
D)
None of the above

Correct Answer :   3 and 4


Explaination : Internet Control Message Protocol (ICMP) is used to send error messages through the network, but they do not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet).

74 .
Which of the following are layers in the TCP/IP model?
 
1. Application
2. Session
3. Transport
4. Internet
5. Data Link
6. Physical
A)
1 and 2
B)
2, 3 and 5
C)
1, 3 and 4
D)
3, 4 and 5

Correct Answer :   1, 3 and 4


Explaination : This seems like a hard question at first because it doesn't make sense. The listed answers are from the OSI model and the question asked about the TCP/IP protocol stack (DoD model). However, let's just look for what is wrong. First, the Session layer is not in the TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (Application/Process in the DoD).

A)
TCP
B)
UDP
C)
IP
D)
TCP/IP

Correct Answer :   TCP


Explanation : Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about layer 4, and IP works at layer 3. Telnet uses TCP at layer 4.

A)
IP
B)
ARP
C)
ICMP
D)
RARP

Correct Answer :   ARP


Explanation : Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.

A)
DNS
B)
FTP
C)
SMTP
D)
Telnet

Correct Answer :   DNS


Explanation : DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address.

A)
0xxxxxxx
B)
01xxxxxx
C)
110xxxxx
D)
10xxxxxx

Correct Answer :   10xxxxxx


Explanation : The range of a Class B network address is 128-191. This makes our binary range 10xxxxxx.

A)
Session
B)
Transport
C)
Application
D)
Presentation

Correct Answer :   Application


Explanation : Both FTP and Telnet use TCP at the Transport layer; however, they both are Application layer protocols, so the Application layer is the best answer.

A)
enable secret cisco
B)
enable password Cisco
C)
enable secret password Cisco
D)
enable secret Cisco

Correct Answer :   enable secret Cisco


Explanation : The enable secret password is case sensitive, so the second option is wrong. To set the enable secret <password>, use the enable secret <password> command from global configuration mode.

81 .
Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?
 
1. show version
2. show protocols
3. show interfaces
4. show controllers
5. show ip interface
A)
1, 2 and 4
B)
2, 3 and 5
C)
3 and 4 only
D)
None of the above

Correct Answer :   2, 3 and 5


Explaination : The commands show protocols, show interfaces, and show ip interface will show you the layer 1 and 2 status and the IP addresses of your router's interfaces.

A)
show versions
B)
show interfaces
C)
show startup-config
D)
show running-config

Correct Answer :   show interfaces


Explanation : With the show interfaces command, you can view the configurable parameters, get statistics for the interfaces on the router, verify if the interfaces are shut down, and see the IP address of each interface.

A)
Router(config)#line vty 0 4
B)
Router#line vty 0 4
C)
Router(config)#line vty all
D)
Router(config-if)#line console 0

Correct Answer :   Router(config)#line vty 0 4


Explanation : From global configuration mode, use the line vty 0 4 command to set all five default VTY lines.

A)
Router#copy starting to running
B)
Router(config)#copy current to starting
C)
Router#copy run startup
D)
Router(config)#copy running-config startup-config

Correct Answer :   Router#copy run startup


Explanation : To copy the running-config to NVRAM so that it will be used if the router is restarted, use the copy running-config startup-config command (copy run start for short).

85 .
You type Router#sh ru and receive an % ambiguous command error. Why did you receive this message?
A)
There is no show command that starts with ru.
B)
The command requires additional options or parameters.
C)
The command is being executed from the wrong router mode.
D)
There is more than one show command that starts with the letters ru.

Correct Answer :   There is more than one show command that starts with the letters ru.


Explaination : The % ambiguous command error means that there is more then one possible command that starts with ru. Use a question mark to find the correct command.

A)
message motd
B)
message banner motd
C)
banner motd
D)
banner message motd

Correct Answer :   banner motd


Explanation : The typical banner is a Message Of The Day (MOTD) and is set by using the global configuration mode command banner motd.

A)
sh int s0
B)
show controllers serial 0
C)
sh int serial 0
D)
show serial 0 controllers

Correct Answer :   show controllers serial 0


Explanation : The show controllers serial 0 command will show you whether either a DTE or DCE cable is connected to the interface. If it is a DCE connection, you need to add clocking with the clock rate command.

A)
Setup mode
B)
Global mode
C)
Privileged mode
D)
NVRAM loaded mode

Correct Answer :   Setup mode


Explanation : If you delete the startup-config and reload the router, the router will automatically enter setup mode. You can also type setup from privileged mode at any time.

A)
reload
B)
copy start run
C)
copy run start
D)
replace run start

Correct Answer :   reload

A)
No cable is attached.
B)
The administrator is pinging from the interface.
C)
The keepalives are different times.
D)
The administrator has the interface shut down.

Correct Answer :   The administrator has the interface shut down.


Explanation : If an interface is shut down, the show interface command will show the interface as administratively shut down. (It is possible that no cable is attached, but you can't tell that from this message.)

A)
2
B)
3
C)
4
D)
5

Correct Answer :   5


Explanation : Cisco routers, if they do not have the Enterprise edition of the IOS, will default to 5 simultaneous Telnet sessions.

A)
show protocols
B)
show interfaces
C)
show startup-config
D)
show running-config

Correct Answer :   show interfaces


Explanation : The command show ip protocols will actually show you the broadcast address for each interface - too bad it isn't a possible answer. Your best answer is show interfaces, which will provide the IP address and mask for each interface.

A)
port to port delivery
B)
process to process delivery
C)
bit-by-bit delivery
D)
application to application delivery

Correct Answer :   bit-by-bit delivery


Explanation : Physical layer deals with bit to bit delivery in networking. The data unit in the physical layer is bits. Process to process delivery or the port to port delivery is dealt in the transport layer. The various transmission mediums aid the physical layer in performing its functions.

A)
coaxial cable
B)
optical fiber
C)
electrical cable
D)
twisted pair cable

Correct Answer :   optical fiber


Explanation : Fiber optics is considered to have the highest transmission speed among the all mentioned above. The fiber optics transmission runs at 1000Mb/s. It is called as 1000Base-Lx whereas IEEE standard for it is 802.3z. It is popularly used for modern day network connections due to its high transmission rate.

A)
packets
B)
bytes
C)
bits
D)
frames

Correct Answer :   packets


Explanation : In computer networks, the data from the application layer is sent to the transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits.

A)
Only host address
B)
Only network address
C)
Network address & MAC address
D)
Network address & Host address

Correct Answer :   Network address & Host address


Explanation : An ip address which is 32 bits long, that means it is of 4 bytes and is composed of a network and host portion and it depends on address class. The size of the host address and network address depends upon the class of the address in classful IP addressing.

A)
network layer
B)
transport layer
C)
physical layer
D)
application layer

Correct Answer :   network layer


Explanation : In computer networks, the data from application layer is sent to transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits. Error control and flow control data is inserted in the frames at the data link layer.

A)
error control sublayer
B)
logical link control sublayer
C)
media access control sublayer
D)
network interface control sublayer

Correct Answer :   media access control sublayer


Explanation : Media access control (MAC) deals with transmission of data packets to and from the network-interface card, and also to and from another remotely shared channel. The MAC sublayer also prevents collision using protocols like CSMA/CD.

A)
addresses
B)
frame identifier
C)
synchronization bytes
D)
all of the above

Correct Answer :   all of the above


Explanation : In a frame, the header is a part of the data that contains all the required information about the transmission of the file. It contains information like synchronization bytes, addresses, frame identifier etc. It also contains error control information for reducing the errors in the transmitted frames.

A)
media access control sublayer
B)
logical link control sublayer
C)
network interface control sublayer
D)
application access control sublayer

Correct Answer :   logical link control sublayer


Explanation : The logical link control is a sublayer of data link layer whose main function is to manage traffic, flow and error control. The automatic repeat request error management mechanism is provided by the LLC when an error is found in the received frame at the receiver’s end to inform the sender to re-send the frame.

A)
Code Repeat Check
B)
Cyclic Redundancy Check
C)
Cyclic Repeat Check
D)
Code Redundancy Check

Correct Answer :   Cyclic Redundancy Check


Explanation : Cyclic Redundancy Check is a code that is added to a data which helps us to identify any error that occurred during the transmission of the data. CRC is only able to detect errors, not correct them. CRC is inserted in the frame trailer.

A)
CSMA/CD
B)
CSMA/CA
C)
Both CSMA/CD & CSMA/CA
D)
HDLC

Correct Answer :   Both CSMA/CD & CSMA/CA


Explanation : In CSMA/CD, it deals with detection of collision after collision has occurred, whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel access.

A)
piggybacking
B)
parity check
C)
fletcher’s checksum
D)
cyclic redundancy check

Correct Answer :   piggybacking


Explanation : Piggybacking is a technique in which the acknowledgment is temporarily delayed so as to be hooked with the next outgoing data frame. It saves a lot of channel bandwidth as in non-piggybacking system, some bandwidth is reserved for acknowledgement.

A)
physical layer
B)
data link layer
C)
network layer
D)
application layer

Correct Answer :   network layer


Explanation : The flow of data in the OSI model flows in following manner Application -> Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer has its own set of functions and protocols to ensure efficient network performance.

A)
TCP and FTP
B)
UDP and HTTP
C)
HTTP and FTP
D)
TCP and UDP

Correct Answer :   TCP and UDP


Explanation : Both TCP and UDP are transport layer protocol in networking. TCP is an abbreviation for Transmission Control Protocol and UDP is an abbreviation for User Datagram Protocol. TCP is connection oriented whereas UDP is connectionless.

A)
wins
B)
wsock
C)
sockwi
D)
winsock

Correct Answer :   winsock


Explanation : Winsock is a programming interface which deals with input output requests for internet applications in windows OS. It defines how windows network software should access network services.

A)
structured stream transport
B)
datagram congestion control protocol
C)
user congestion control protocol
D)
stream control transmission protocol

Correct Answer :   datagram congestion control protocol


Explanation : The datagram congestion control is a transport layer protocol which deals with reliable connection setup, teardown, congestion control, explicit congestion notification, and feature negotiation. It is used in modern day systems where there are really high chances of congestion. The protocol was last updated in the year 2008.

A)
port
B)
pipe
C)
node
D)
protocol

Correct Answer :   port


Explanation : Just as the IP address identifies the computer, the network port identifies the application or service running on the computer. A port number is 16 bits. The combination of IP address preceded with the port number is called the socket address.

A)
Only source address
B)
Only destination address
C)
A short VC number
D)
Full source and destination address

Correct Answer :   A short VC number


Explanation : A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is used to distinguish between several virtual circuits in a connection oriented circuit switched network. Each virtual circuit is used to transfer data over a larger packet switched network.

A)
Distance vector routing
B)
Link state routing
C)
Shortest path algorithm
D)
All of the above

Correct Answer :   All of the above


Explanation : The routing algorithm is what decides where a packet should go next. There are several routing techniques like shortest path algorithm, static and dynamic routing, decentralized routing, distance vector routing, link state routing, Hierarchical routing etc. The routing algorithms go hand in hand with the operations of all the routers in the networks. The routers are the main participants in these algorithms.

A)
spider tree
B)
special tree
C)
spanning tree
D)
spider structure

Correct Answer :   spanning tree


Explanation : Spanning tree protocol (STP) is a network protocol that creates a loop free logical topology for ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network.

A)
ethernet
B)
internet protocol
C)
file transfer protocol
D)
hypertext transfer protocol

Correct Answer :   internet protocol


Explanation : There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer.

A)
routing
B)
forwarding
C)
addressing
D)
error and diagnostic functions

Correct Answer :   error and diagnostic functions


Explanation : ICMP abbreviation for Internet Control Message Protocol is used by networking devices to send error messages and operational information indicating a host or router cannot be reached. ICMP operates over the IP packet to provide error reporting functionality as IP by itself cannot report errors.

A)
physical signalling sublayer
B)
physical data sublayer
C)
physical transport sublayer
D)
physical address sublayer

Correct Answer :   physical signalling sublayer


Explanation : The portion of physical layer that interfaces with the medium access control sublayer is Physical Signaling Sublayer. The main function of this layer is character encoding, reception, decoding and performs optional isolation functions. It handles which media connection the signal should be forwarded to physically.

A)
specification for IR over optical fiber
B)
electrical specification of transmission line signal level
C)
mechanical specifications of electrical connectors and cables
D)
all of the above

Correct Answer :   all of the above


Explanation : Anything dealing with a network cable or the standards in use – including pins, connectors and the electric current used is dealt in the physical layer (Layer 1). Physical layer deals with bit to bit delivery of the data aided by the various transmission mediums.

A)
infrared
B)
radio waves
C)
microwaves
D)
all of the above

Correct Answer :   all of the above


Explanation : Wireless transmission is carried out by radio waves, microwaves and IR waves. These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless transmission. Radio waves can penetrate through walls and are used in radio communications, microwaves and infrared (IR) waves cannot penetrate through walls and are used for satellite communications and device communications respectively.

A)
network layer
B)
data link layer
C)
trasnport layer
D)
application layer

Correct Answer :   data link layer


Explanation : Physical layer accepts data or information from the data link layer and converts it into hardware specific operations so as to transfer the message through physical cables. Some examples of the cables used are optical fiber cables, twisted pair cables and co-axial cables.

A)
Routing
B)
Control
C)
Topology
D)
Networking

Correct Answer :   Topology


Explanation : Topology in networks is the structure or pattern in which each and every node in the network is connected. There are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. There is no particular best topology and a suitable topology can be chosen based on the kind of application of the network .

A)
Star
B)
Bus
C)
Ring
D)
Mesh

Correct Answer :   Star


Explanation : In star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. Every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer.

A)
LAN
B)
MAN
C)
WAN
D)
PAN

Correct Answer :   WAN


Explanation : WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. WANs are used to connect cities, states or even countries. A wireless connection is required to build a WAN. The best example of WAN is the Internet.

A)
TDM
B)
PDM
C)
FDM
D)
None of the Above

Correct Answer :   FDM


Explanation : FDM is an abbreviation for Frequency Division Multiplexing. This technique is used when the bandwidth of the channel is greater than the combined bandwidth of all the signals which are to be transmitted. The channel is active at all times unless a collision occurs with another channel trying to use the same frequency. Some other multiplexing techniques are Time division multiplexing and Phase division multiplexing.

A)
D-net
B)
Telnet
C)
Internet
D)
Botnet

Correct Answer :   Botnet


Explanation : Botnet is a network of compromised devices used by the attacker without the owner’s knowledge to perform unethical activities such as spamming. The attacker usually uses the least secure devices to create the botnet.

A)
UDP Flooding
B)
Vulnerability Attack
C)
Bandwidth Flooding
D)
Connection Flooding

Correct Answer :   Connection Flooding


Explanation : In Vulnerability attack, the attacker exploits the vulnerable control points of the network to deny access to the victims. In Bandwidth flooding, the attacker intentionally uses up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the victim can’t use any bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to the victim at random ports.

A)
Bandwidth flooding
B)
UDP flooding
C)
Vulnerability attack
D)
Connection flooding

Correct Answer :   Bandwidth flooding


Explanation : In Bandwidth flooding, the attacker floods the victim machine with a deluge of packets to make sure that no bandwidth is available. The victim then cannot utilize the complete bandwidth to perform its operation.

A)
Active receiver
B)
Passive receiver
C)
Legal receiver
D)
Partially-active receiver

Correct Answer :   Passive receiver


Explanation : The function of packet sniffers is to just silently receive the packets flowing in the channel. If they inject any packets into the channel, they might alert the other users about the intrusion.

A)
TCP traffic
B)
Sensitive traffic
C)
UDP traffic
D)
Best-effort traffic

Correct Answer :   UDP traffic


Explanation : UDP is more vulnerable to attacks, so firewalls are often configured to block suspicious UDP traffic.

A)
Bits
B)
Packets
C)
Frames
D)
Seconds

Correct Answer :   Frames


Explanation : TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.

A)
32kbps
B)
32bps
C)
500bps
D)
500kbps

Correct Answer :   32kbps


Explanation :

Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps

A)
FDM
B)
WDM
C)
FDM & WDM
D)
TDM

Correct Answer :   TDM


Explanation : TDM abbreviation for Time Division Multiplexing is a method used for digital signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).

A)
Data switching
B)
Circuit switching
C)
Packet switching
D)
Packet & Circuit switching

Correct Answer :   Circuit switching


Explanation : Circuit switching is a switching method by which one can obtain a physical path between end points. Circuit switching method is also called a connection oriented network. Two nodes must be physically and logically connected to each other to create a circuit switching network.

A)
Duplexing
B)
Multiplexing
C)
Micropleixng
D)
Fully duplexing

Correct Answer :   Multiplexing


Explanation : Multiplexing is a method using which one can send multiples signals through a shared medium at the same time. This helps in using less resources and thus saving the cost of sending messages.

A)
4
B)
3
C)
2
D)
1

Correct Answer :   2


Explanation : Coaxial cable has an inner conductor surrounded by a insulating layer, which is surrounded by a conducting shield. Coaxial cable is used to carry high frequency signals with low losses.

A)
Very hard to tap
B)
Very less signal attenuation
C)
Immune electromagnetic interference
D)
All of the Above

Correct Answer :   All of the Above


Explanation : In fibre optics the transmission of information is in the form of light or photons. Due to all above properties mentioned in options fibre optics can be submerged in water and are used at more risk environments.

A)
Can penetrate walls
B)
Can carry signals for long distance
C)
Connectivity can be given to mobile user
D)
All of the above

Correct Answer :   All of the above


Explanation : Radio channels can penetrate walls, can be used to provide connectivity to mobile users and can also carry signals for long distances.

A)
Are placed at a fixed point above the earth
B)
Rotate the earth about a fixed axis
C)
Rotate the earth about a varying axis
D)
All of the above

Correct Answer :   Are placed at a fixed point above the earth


Explanation : They are placed in orbit at 36,000km above Earth’s surface.

A)
Network
B)
File server
C)
Print server
D)
Communication server

Correct Answer :   File server


Explanation : A file server allows LAN users to share computer programs and data. It uses the File Transfer Protocol to provide this feature on ports 20 and 21. The file server works as a medium for the transfer.

A)
Spanning Tree Protocol Cable
B)
Shielded Two Power Cable
C)
Shielded Twisted Pair Cable
D)
Static Transport Protocol Cable

Correct Answer :   Shielded Twisted Pair Cable


Explanation : For physical media, STP cable stands for Shielded twisted pair cable. 100 Mbps is the max data capacity of STP cable and its default connector is RJ45. It is popularly used in LANs due to its ease of maintenance and installation.

A)
Security management
B)
Recovery management
C)
Performance management
D)
Configuration management

Correct Answer :   Security management


Explanation : The Security management portion of LAN management software restricts access, records user activities, and audit data. It is responsible for controlling access to the network based on predefined policy. The security management ensures authentication, confidentiality, and integrity in the LAN.

A)
100 ft
B)
200 ft
C)
100 m
D)
200 m

Correct Answer :   100 m


Explanation : The max the Shielded twisted pair cable is 100 meters. If the length exceeds 100 meters, the loss of signals flowing through the cable would be really high. Thus, STP cable is more suitable for smaller networks like LANs.

A)
10 Mbps
B)
100 Mbps
C)
1000 Mbps
D)
10000 Mbps

Correct Answer :   100 Mbps


Explanation : 100 Mbps is the max data transfer rate that can be handled by STP cables, and its default connector is RJ-45. 100 Mbps is a feasible data transfer rate for small networks like LANs.

A)
BNC
B)
RJ-11
C)
RJ-33
D)
RJ-45

Correct Answer :   RJ-45


Explanation : RJ-45 is used for STP cable. 100 Mbps is the max data transfer rate that can be handled by STP. RJ-45 is popularly used to connect to modern-day routers, computer network cards, and other network devices.

A)
10 Mbps
B)
100 Mbps
C)
1000 Mbps
D)
10000 Mbps

Correct Answer :   10000 Mbps


Explanation : Fiber channel speeds have been increasing over the years. 10000 Mbps is the max data transfer rate for optical fiber cables. It is said to be the fastest among the other kinds of cables like STP cables and co-axial cables. People are now using optical fiber cables instead of STP cables for LANs due to their fast data transfer capability.

A)
Ethernet
B)
Router
C)
ARC net
D)
STP server

Correct Answer :   Ethernet


Explanation : Collision detection is not possible in Ethernet without extensions. Collision detection techniques for multiple access like CSMA/CD are used to detect collisions in the Ethernet architecture.

A)
Bit switched
B)
Line switched
C)
Circuit switched
D)
Packet switched

Correct Answer :   Circuit switched


Explanation : Circuit switching is connection oriented switching technique, whereas in the case of packet switching, it is connectionless. Circuit switching is implemented in the Physical layer, whereas packet switching is implemented in the Network layer. Internet too is based on the concept of circuit switching.

A)
Line switching and bit switching
B)
Packet switching and Circuit switching
C)
Circuit switching and Line switching
D)
Packet switching and Line switching

Correct Answer :   Packet switching and Circuit switching


Explanation : Packet switching and Circuit switching are two different types of switching methods used to connect the multiple communicating devices with one another. Packet switching is used in conventional LAN systems and circuit switching is used in telephonic systems.

A)
Line switching
B)
Packet switching
C)
Circuit switching
D)
Frequency switching

Correct Answer :   Circuit switching


Explanation : In circuit switching, a physical path between the sender and receiver is established. This path is maintained until the connection is needed. Circuit switching is implemented in the Physical layer and is used in telephonic systems.

A)
reliability
B)
authentication
C)
store and forward
D)
guaranteed constant rate

Correct Answer :   guaranteed constant rate


Explanation : Circuit switching is connection oriented and is always implemented in the physical layer. Once a path is set, all transmission occurs through the same path. It is used since the early times in telephonic systems.

A)
Persistent
B)
Non-persistent
C)
Can be either persistent or non-persistent depending on connection request
D)
None of the above

Correct Answer :   Persistent


Explanation : By default the http connection is issued with persistent connection. In persistent connection server leaves connection open after sending response. As little as one RTT (Time for a small packet to travel from client to server and back) is required for all referenced objects.

A)
JTT
B)
RTT
C)
PTT
D)
STT

Correct Answer :   RTT


Explanation : RTT stands for Round-Trip Time.

A)
First
B)
Second
C)
Third
D)
Fourth

Correct Answer :   Third


Explanation : In first step client sends a segment to establish a connection with the server. In the second the step the client waits for the acknowledgement to be received from the server. After receiving the acknowledgement, the client sends actual data in the third step.

A)
Entity line
B)
Status line
C)
Request line
D)
Header line

Correct Answer :   Request line


Explanation : The line followed by request line are called header lines and status line is the initial part of response message.

A)
Header line
B)
Status line
C)
Entity body
D)
Request line

Correct Answer :   Request line


Explanation : It is specified in the method field of request line in the HTTP request message.

A)
GET
B)
PUT
C)
POST
D)
SEND

Correct Answer :   GET


Explanation : There are two methods which help to request a response from a server. Those are GET and POST. In GET method, the client requests data from server. In POST method the client submits data to be processed to the server.

A)
Limits the number of response from a server
B)
Helps to keep a cache upto date
C)
Imposes conditions on the objects to be requested
D)
None of the above

Correct Answer :   Helps to keep a cache upto date


Explanation : The HTTP protocol requests the server of the website its trying to access so that it can store its files, images etc. in cache memory. This request of asking the server for a document considering a specific parameter is called conditional GET Request.

A)
200 OK
B)
400 Bad Request
C)
301 Moved permanently
D)
304 Not Found

Correct Answer :   304 Not Found


Explanation : 404 Not Found.

A)
First Transfer Protocol
B)
Fast Transfer Protocol
C)
File Transfer Protocol
D)
Fine Transfer Protocol

Correct Answer :   File Transfer Protocol


Explanation : File Transfer Protocol is an application layer protocol used to share “files” between a server and a client. The protocol uses two separate ports for data and control connections: port 20 for data and port 21 for control.

A)
P2P
B)
Data centric
C)
Client-server
D)
Service oriented

Correct Answer :   Client-server


Explanation : An FTP connection includes a Server and a Client which wish to share a number of data files. The server can transfer files with multiple clients at the same time while the client communicates with only one server at a time.

A)
1
B)
2
C)
3
D)
4

Correct Answer :   2


Explanation : Control connection using FTP port: 21, and data connection using FTP port: 20. The FTP session is started or ended using port 21 and the actual data i.e. files are sent through port 20.

A)
8
B)
7
C)
6
D)
5

Correct Answer :   7


Explanation : FTP was designed to transmit commands only in English characters that are possible with just 7 bits in ASCII. Even the media has to be converted to ASCII before transmission.

A)
452 – Error writing file
B)
425 – Can’t open data connection
C)
331 – Username OK, Password Required
D)
452 – Can’t open data connection

Correct Answer :   452 – Can’t open data connection


Explanation : The correct response code for the message “Can’t open data connection” is 425. Response code 452 is sent usually when the connection is suddenly closed.

A)
PASS
B)
PWORD
C)
PASSWD
D)
PASSWORD

Correct Answer :   PASS


Explanation : The PASS command, preceded by the username, completes the user’s identification for access control in an FTP session. Without the valid password, the user won’t be able to initiate the FTP connection.

A)
Peer
B)
Master
C)
SMTP client
D)
SMTP server

Correct Answer :   SMTP client


Explanation : SMTP clients are the entities that send mails to other mail servers. The SMTP servers cannot send independent mails to other SMTP servers as an SMTP server. There are no masters or peers in SMTP as it is based on the client-server architecture.

A)
Simple Mail Transmission Protocol
B)
Simple Message Transfer Protocol
C)
Simple Mail Transfer Protocol
D)
Simple Message Transmission Protocol

Correct Answer :   Simple Mail Transfer Protocol


Explanation : SMTP or Simple Mail Transfer Protocol is an application layer protocol used to transport e-mails over the Internet. Only 7-bit ASCII codes can be sent using SMTP.

A)
MAIL TO
B)
RCPT TO
C)
SEND TO
D)
RCVR TO

Correct Answer :   RCPT TO


Explanation : RCPT TO command is followed by the recipient’s mail address to specify where or to whom the mail is going to through the internet. If there is more than one receiver, the command is repeated for each address continually.

A)
One message
B)
Varies with number of objects
C)
Multiple messages for each object
D)
Separate messages for each object

Correct Answer :   One message


Explanation : It places all objects into one message as it wouldn’t be efficient enough if there are different messages for each object. The objects include the text and all the multimedia to be sent.

A)
50
B)
45
C)
35
D)
25

Correct Answer :   25


Explanation : The ports 15, 35 and 50 are all UDP ports and SMTP only uses TCP port 25 for reliability.

A)
Tumblr
B)
Google
C)
Facebook
D)
Microsoft Outlook

Correct Answer :   Microsoft Outlook


Explanation : Among the options, only Microsoft Outlook is an e-mail agent. Google is a search engine and Facebook, and Tumblr are social networking platforms. Gmail and Alpine are some other examples of e-mail agent.

A)
31 characters
B)
63 characters
C)
255 characters
D)
127 characters

Correct Answer :   255 characters


Explanation : An entire hostname can have a maximum of 255 characters. Although each label must be from 1 to 63 characters long. Host name is actually a label that is given to a device in a network.

A)
DNS handler
B)
DNS resolver
C)
DNS updater
D)
None of the above

Correct Answer :   DNS resolver


Explanation : DNS client also known as DNS resolver also known as DNS lookup helps to resolve DNS requests using an external DNS server.

A)
directly
B)
it is not possible
C)
Both (A) and (B)
D)
by contacting remote DNS server

Correct Answer :   by contacting remote DNS server


Explanation : Whenever a request is received at server from other domains, it handles this situation by contacting remote DNS server.

A)
Name server records
B)
Hostname aliases
C)
Hostname-to-address records
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Domain Name system not only deals with mapping IP addresses with the hostname but also deals with exchange of information in the server.

A)
*
B)
&
C)
#
D)
@

Correct Answer :   *


Explanation : A wildcard DNS record matches requests to a non existent domain name. This wildcard DNS record is specified by using asterisk “*” as the starting of a domain name.

A)
internet society
B)
internet architecture board
C)
internet research task force
D)
internet corporation for assigned names and numbers

Correct Answer :   internet corporation for assigned names and numbers


Explanation : The ICANN (Internet Corporation for Assigned Names and Numbers) deals with IP address space allocation, protocol identifier assignment, generic and country code Top Level domain name system management (gTLD and ccTLD).

A)
Secure data communication
B)
Remote command-line login
C)
Remote command execution
D)
All of the Above

Correct Answer :   All of the Above


Explanation : SSH provides high encryption and security features while communicating through a network. It is a cryptographic network protocol.

A)
Windows
B)
Unix-like operating systems
C)
Both unix-like and windows systems
D)
None of the above

Correct Answer :   Both unix-like and windows systems


Explanation : SSH isn’t confined to a certain network or operating system. It can be implemented over different networks and on different operating systems.

A)
private-key cryptography
B)
public-key cryptography
C)
both public-key & private-key
D)
any of public-key or private-key

Correct Answer :   public-key cryptography


Explanation : Public encryption key is slower but more flexible. Every cryptographic security system requires a private key for private access and a public key for location.

A)
port 22
B)
port 23
C)
port 24
D)
port 25

Correct Answer :   port 22


Explanation : Port 22 is used for contacting ssh servers, used for file transfers (scp, sftp) and also port forwarding.

A)
SCP
B)
SFTP
C)
Rsync
D)
All of the above

Correct Answer :   All of the above


Explanation : SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol) and Rsync all are file transfer protocols which are used by SSH.

A)
transport layer
B)
connection layer
C)
physical layer
D)
user authentication layer

Correct Answer :   physical layer


Explanation : SSH2 is a more secure, portable and efficient version of SSH that includes SFTP, which is functionally similar to FTP, but is SSH2 encrypted.

A)
GCP protocol
B)
DHCP protocol
C)
RCP protocol
D)
MGCP protocol

Correct Answer :   RCP protocol


Explanation : RCP is the abbreviation for Rate Control Protocol is a congestion control algorithm for fast user response times.

A)
Password
B)
Public-key
C)
Host based
D)
All of the above

Correct Answer :   All of the above


Explanation : SSH used public key authentication, Password authentication, Host based authentication, keyboard authentication and authentication of servers.

A)
IP address
B)
Url
C)
MAC address
D)
None of the above

Correct Answer :   IP address


Explanation : We use DHCP to allow the hosts to acquire their ip addresses dynamically which is better than visiting each and every host on the network and configure all of this information manually.

A)
IPv6
B)
IPv4
C)
Both IPv6 and IPv4
D)
None of the above

Correct Answer :   Both IPv6 and IPv4


Explanation : DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the hosts know about the change dynamically, and hosts update their info themselves.

A)
Not time dependent
B)
For a limited period
C)
For an unlimited period
D)
None of the above

Correct Answer :   For a limited period


Explanation : The IP address offered to a client is only for a limited period of time. There is actually a certain amount of time that the client can use and keep this IP address.

A)
66
B)
67
C)
68
D)
69

Correct Answer :   67


Explanation : 67 is the UDP port number that is used as the destination port of a server. Whereas UDP port number 68 is used by the client.

A)
Static allocation
B)
Automatic allocation
C)
Dynamic allocation
D)
All of the above

Correct Answer :   All of the above


Explanation : When a host acquires multiple offers of IP addresses from different DHCP servers, the host will broadcast a dhcp request identifying the server whose offer has been accepted.

A)
Algorithm for DHCP
B)
Encryption of the DHCP server requests
C)
Techniques applied to ensure the security of an existing DHCP infrastructure
D)
None of the above

Correct Answer :   techniques applied to ensure the security of an existing DHCP infrastructure


Explanation : DHCP snooping is a security feature that is used in OS of a network in the layer 2. This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients.

A)
IP address
B)
MAC address
C)
Both MAC address and IP address
D)
None of the above

Correct Answer :   Both MAC address and IP address


Explanation : The DHCP snooping is done to prevent unauthorized IP addresses being offered by unauthorized servers. This features allows only specific mac addresses and IP addresses to access the network.

A)
Network layer
B)
Session layer
C)
Transport layer
D)
Application layer

Correct Answer :   Network layer


Explanation : IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer.

A)
IP trailer
B)
Entire IP packet
C)
IP header
D)
IP payload

Correct Answer :   Entire IP packet


Explanation : In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire packet between the IPSec endpoints. Using encryption, it provides secure communication between the two endpoints.

A)
Authentication Header (AH)
B)
Internet key Exchange (IKE)
C)
Encapsulating Security Payload (ESP)
D)
All of the Above

Correct Answer :   All of the Above


Explanation :

AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message. IKE is used to make sure that only the intended sender and receiver can access the message.

A)
Wi-Fi
B)
Email
C)
Ethernet
D)
Bluetooth

Correct Answer :   Wi-Fi


Explanation : WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network.

A)
FTP security
B)
Email security
C)
WiFi security
D)
Browser security

Correct Answer :   Email security


Explanation : PGP is an encryption method used in e-mail security to encrypt and decrypt the content of an e-mail transmitted over the internet. It makes sure that the message cannot be stolen by other unauthorized users.

A)
DNS lookup
B)
DNS hijacking
C)
DNS spoofing
D)
DNS authorizing

Correct Answer :   DNS spoofing


Explanation : In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid credentials from a victim by spoofing the intended resource, and tricking the victim to give his/her valid authorization credentials.

A)
Invisible from public networks
B)
Logically separated from other traffic
C)
Restricted to a single protocol in IPsec
D)
Accessible from unauthorized public networks

Correct Answer :   Accessible from unauthorized public networks


Explanation : Traffic in a VPN is not accessible from any unauthorized public networks because it is secured with the masking IP address. This provides the benefit of access to blocked resources to the users.

A)
Usually cheaper than leased lines
B)
Always cheaper than leased lines
C)
Always more expensive than leased lines
D)
Usually more expensive than leased lines

Correct Answer :   Usually cheaper than leased lines


Explanation : The services of a VPN are cheaper for moderate to large scale institutional networks than the services of leased lines. Though for a small scale network, it does not prove to be as beneficial as the costs are not reduced to a great degree as compared to leased lines.

A)
Layer 1
B)
Layer 2
C)
Layer 3
D)
Layer 4

Correct Answer :   Layer 3


Explanation : IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. It operates in the network layer.

A)
Cisco
B)
IETF
C)
Microsoft
D)
Blizzard Entertainment

Correct Answer :   Cisco


Explanation : L2F stands for Layer 2 Forwarding protocol. It was designed by Cisco to tunnel PPP traffic, helping create VPNs over the internet.

A)
PPP
B)
IPsec
C)
L2TP
D)
PPTP

Correct Answer :   IPsec


Explanation : ESP is a security component of IPSec. ESP provides content protection and ensures that there is integrity and confidentiality of the message. The other security components of IPSec are Authentication Header and Internet Key Exchange.

A)
Only IP
B)
Only IPX
C)
Only ICMP
D)
IP and IPX

Correct Answer :   IP and IPX


Explanation : L2TP stands for Layer 2 Tunneling Protocol. It is used to tunnel all the L2 traffic on an IP network and is able to transmit network layer’s IP and IPX protocol data.

A)
L2TP
B)
IPsec
C)
PPTP
D)
YMUM

Correct Answer :   YMUM


Explanation : PPTP is a tunneling protocol which was initially used for the creation of VPNs. IPSec is used in encrypting the traffic flowing in the VPN. L2TP is used to tunnel all the L2 traffic on the VPN.

A)
Disk operation
B)
Data protection
C)
SAN Management
D)
All of the above

Correct Answer :   All of the above


Explanation : SAN management, data protection and disk operation are the main components of the Storage Management Initiative Specification. SMI-S was developed by the Storage Networking Industry Association.

A)
MIB
B)
LDAP
C)
SNMP
D)
POP3

Correct Answer :   SNMP


Explanation : Simple Network Management Protocol is used for storage management. Lightweight Directory Access Protocol is used to access or locate information about directories and other resources on a network. Post Office Protocol 3 is used for e-mailing on the internet. Management Information Base is a part of SNMP and contains hierarchically organized information.

A)
By using Zoning
B)
By keeping devices when used
C)
By keeping devices shutdown when not in use
D)
By putting a physical lock on the storage device

Correct Answer :   By using Zoning


Explanation : Zoning is a method in SAN that can be used by a storage administrator to specify who can see what in the SAN. Zoning might complicate the scaling process if the size of the SAN increases.

A)
.NET
B)
CIM-XML/HTTP
C)
CORBA
D)
Java RMI

Correct Answer :   CIM-XML/HTTP


Explanation : The Distributed Management Task Force maintains a Common Information Model (CIM) to represent a common set of network objects and their relationships. CIM-XML/HTTP refers to the operations of CIM being performed over HTTP or XML. SMI-S uses CIM-XML/HTTP.

A)
TCP
B)
HTML
C)
SNMP
D)
SNMP/IP

Correct Answer :   SNMP


Explanation : SNMP stands for Simple Network Management Protocol. It is an application-level protocol in which a few manager stations control a set of agents. It is used under the TCP/IP protocol suite and is used for managing devices on the internet.

A)
1 to 2 mbps
B)
10 to 20 mbps
C)
20 to 30 mbps
D)
40 to 50 mbps

Correct Answer :   10 to 20 mbps


Explanation : In full duplex mode, both endpoints share a single channel bandwidth to achieve two-way transmission. This results in complete utilization of the band capacity increasing the capacity by 10 to 20 mbps than half-duplex mode.

A)
Configuration and dialing up
B)
Documentation and dialing up
C)
Management and configuration
D)
Reconfiguration and documentation

Correct Answer :   Reconfiguration and documentation


Explanation : The best current practices report is created by a management group to ensure the most effective configuration management. The group also makes a MIB (Management Information Base) module to help with the configuration management.

A)
Integration
B)
Classification
C)
Management
D)
Enhanced security

Correct Answer :   Enhanced security


Explanation : SNMPv3 has introduced new cryptographic security, through which confidentiality is provided by encrypting packets and blocking intruders. It also ensures that the message is coming from a reliable source.

A)
Basic Encoding Rules
B)
Basic Encoding Rotator
C)
Basic Encoding Router
D)
Basic Encoding Resolver

Correct Answer :   Basic Encoding Rules


Explanation : The Basic Encoding Rules are a set of rules that specify the guidelines to encode the SNMP messages in binary form. Each SNMP message is encoded into 3 parts namely data, length and type of message.

A)
UDP
B)
SMTP
C)
TCP/IP protocol
D)
None of the Above

Correct Answer :   TCP/IP protocol


Explanation : SNMP is a management protocol in which a few manager stations control a set of agents using the TCP/IP protocol suite. SNMP stands for Simple Network Management Protocol.

A)
FTP
B)
Telnet
C)
HTTP
D)
SMTP

Correct Answer :   Telnet


Explanation : Telnet is an application layer protocol that provides access to the command-line interface on a remote host. Telnet stands for teletype network.

A)
Television on net
B)
Remote Login
C)
Teleshopping site
D)
Network of Telephones

Correct Answer :   Remote Login


Explanation : Telnet is an application layer protocol that provides access to the command line interface of a remote computer that can be used to perform remote login.

A)
Server mode
B)
Default mode
C)
Character mode
D)
Line mode