1. Networking Concepts Flashcards

1
Q

This part of the OSI model transmits raw bit streams over a physical medium, including cables, connectors, and signaling standards.

A

Layer 1 - Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This part of the OSI model is responsible for node-to-node data transfer, framing, MAC addressing, and error detection (not correction).

A

Layer 2 - Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This part of the OSI model handles logical addressing (IP), routing, and packet forwarding across networks.

A

Layer 3 - Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This part of the OSI model ensures reliable end-to-end communication with segmentation, flow control, and error correction (e.g., TCP/UDP).

A

Layer 4 - Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This part of the OSI model establishes, maintains, and terminates communication sessions between applications.

A

Layer 5 - Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This part of the OSI model translates, encrypts, compresses, or formats data for delivery between systems.

A

Layer 6 - Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This part of the OSI model provides network services directly to end-user applications, including protocols like HTTP, FTP, and SMTP.

A

Layer 7 - Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which OSI layer is responsible for IP addressing and routing?
A. Transport
B. Network
C. Data Link
D. Presentation

A

B. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At which OSI layer do MAC addresses operate?
A. Physical
B. Network
C. Data Link
D. Session

A

C. Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which layer ensures reliable transmission of data segments, handles flow control, and retransmissions?
A. Transport
B. Network
C. Session
D. Application

A

A. Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which OSI layer is responsible for establishing and managing sessions between applications?
A. Transport
B. Session
C. Application
D. Presentation

A

B. Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following layers deals with syntax, encryption, and compression of data?
A. Session
B. Presentation
C. Application
D. Data Link

A

B. Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP, FTP, and SMTP protocols operate at which OSI layer?
A. Transport
B. Session
C. Presentation
D. Application

A

D. Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which OSI layer converts bits to electrical signals and defines the hardware elements involved in data transmission?
A. Data Link
B. Network
C. Physical
D. Presentation

A

C. Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two layers are primarily responsible for delivering data from one device to another on the same local network? (Choose two)
A. Physical
B. Network
C. Data Link
D. Application

A

A. Physical and C. Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This appliance directs traffic between different networks and determines the best path for data.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This appliance connects devices on the same network and forwards data based on MAC addresses.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This appliance monitors and filters incoming/outgoing traffic based on security rules.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This appliance monitors traffic for malicious activity and alerts admins without taking action.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This appliance monitors traffic and actively blocks malicious activity in real time.

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This appliance distributes incoming network traffic across multiple servers to improve performance and reliability.

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This appliance acts as an intermediary for requests between clients and servers, often for filtering or caching.

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This storage device connects to a network and allows file-level access to shared data.

A

Network-Attached Storage (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This storage system provides block-level access to data across a dedicated high-speed network.

A

Storage Area Network (SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This device enables wireless devices to connect to a wired network using Wi-Fi.

A

Wireless Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This device manages multiple access points and centralizes configuration for wireless networks.

A

Wireless Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This application distributes content (like video or web data) from edge servers to reduce latency and load times.

A

Content Delivery Network (CDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This function creates an encrypted tunnel over the internet to securely connect remote users or sites.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This function prioritizes network traffic based on type, user, or application to ensure performance for critical services.

A

Quality of Service (QoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This function limits the lifespan of a packet by specifying how many hops it can take before being discarded.

A

Time to Live (TTL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which device is responsible for directing data packets between different networks based on IP addresses?
A. Switch
B. Firewall
C. Router
D. Load Balancer

A

C. Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which device forwards traffic based on MAC addresses and is commonly used within LANs?
A. Router
B. Switch
C. Firewall
D. Access Point

A

B. Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which appliance is designed to analyze traffic and automatically block malicious activity?
A. IDS
B. VPN
C. IPS
D. Proxy

A

C. IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which device can act as an intermediary to filter or cache internet traffic for users?
A. Load Balancer
B. Proxy
C. Firewall
D. NAS

A

B. Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which storage technology provides block-level access over a dedicated high-speed network?
A. NAS
B. SAN
C. CDN
D. VPN

A

B. SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which wireless device manages and configures multiple access points centrally?
A. Switch
B. Wireless Controller
C. Access Point
D. IDS

A

B. Wireless Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which application helps reduce latency by distributing content from geographically close servers?
A. QoS
B. VPN
C. CDN
D. SAN

A

C. CDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which function helps prioritize traffic to improve the performance of time-sensitive applications?
A. TTL
B. Load Balancing
C. IDS
D. QoS

A

D. QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the main purpose of TTL in a network packet?
A. Encrypt data
B. Determine maximum hops
C. Identify application layer
D. Assign MAC address

A

B. Determine maximum hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

This cloud concept allows network services like firewalls and load balancers to run as software-based solutions rather than physical appliances.

A

Network Functions Virtualization (NFV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This is a logically isolated section of a cloud provider’s network that simulates a traditional on-premises network.

A

Virtual Private Cloud (VPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

These are firewall-like rules that control inbound and outbound traffic at the virtual machine or instance level.

A

Network Security Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

These are rule sets used to control traffic at the subnet level in a cloud network.

A

Network Security Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

This gateway connects a cloud environment to the public internet.

A

Internet Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

This gateway allows private cloud resources to access the internet using private IP addresses, translating them to public IPs.

A

NAT Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

This cloud connectivity option creates a secure encrypted tunnel between on-premises and cloud environments.

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

This cloud connectivity option establishes a dedicated, private physical connection between an organization and the cloud provider.

A

Direct Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

This deployment model delivers services over the public internet from a cloud provider.

A

Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

This deployment model is used by a single organization and offers more control and security.

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

This deployment model combines on-premises infrastructure with public cloud services.

A

Hybrid Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

This service model provides end-user applications over the internet without requiring local installation.

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

This service model offers virtualized computing resources like servers and storage.

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

This service model provides a framework for developers to build, deploy, and manage applications.

A

Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

This concept refers to the ability to increase or decrease cloud resources as needed.

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

This cloud capability automatically adds or removes resources in real time based on current demand.

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

This cloud feature allows multiple customers to share the same computing resources securely and efficiently.

A

Multitenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which cloud concept allows network appliances to run as virtualized services?
A. SaaS
B. Elasticity
C. NFV
D. Direct Connect

A

C. NFV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which cloud service model allows users to rent virtual servers and storage?
A. SaaS
B. PaaS
C. NFV
D. IaaS

A

D. IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What does a Virtual Private Cloud (VPC) provide?
A. Dedicated physical network access
B. A shared public internet IP pool
C. Isolated virtual network in the cloud
D. Private WAN encryption

A

C. Isolated virtual network in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which cloud feature allows for automatic resource allocation based on real-time demand?
A. Scalability
B. Elasticity
C. Multitenancy
D. NFV

A

B. Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which service model provides access to applications like email or word processing online?
A. IaaS
B. SaaS
C. NFV
D. PaaS

A

B. SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which option provides a dedicated, private connection between an organization and the cloud provider?
A. VPN
B. Direct Connect
C. Internet Gateway
D. VPC

A

B. Direct Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which concept allows multiple customers to share the same infrastructure securely?
A. Hybrid Cloud
B. Multitenancy
C. Direct Connect
D. VPC

A

B. Multitenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which gateway allows private cloud resources to access the internet using public IPs?
A. Direct Connect
B. Internet Gateway
C. NAT Gateway
D. VPN

A

C. NAT Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

This protocol uses ports 20 and 21 to transfer files over a network without encryption.

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

This encrypted file transfer protocol operates over port 22.

A

Secure File Transfer Protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

This secure command-line protocol also uses port 22 for remote administration.

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

This unencrypted command-line access protocol uses port 23.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

This protocol, using port 25, is used to send emails.

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

This protocol resolves domain names to IP addresses over port 53.

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

This protocol dynamically assigns IP addresses using ports 67 and 68.

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A simplified file transfer protocol that operates over port 69 without authentication.

A

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

This protocol delivers web content using port 80.

A

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

This protocol syncs clocks between networked devices using port 123.

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

This protocol collects and manages network data using ports 161 (requests) and 162 (traps).

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

This protocol is used for directory services and authentication over port 389.

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

This encrypted version of HTTP uses port 443.

A

Hypertext Transfer Protocol Secure (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Used for file sharing on Windows networks over port 445.

A

Server Message Block (SMB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

This protocol sends system logs over port 514.

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

This is a secure version of SMTP using port 587.

A

Simple Mail Transfer Protocol Secure (SMTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

This protocol provides secure directory access over port 636.

A

Lightweight Directory Access Protocol over SSL (LDAPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

This protocol is used to manage Microsoft SQL Server over port 1433.

A

Structured Query Language (SQL) Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

This protocol provides remote desktop access over port 3389.

A

Remote Desktop Protocol (RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

This protocol initiates VoIP and video calls using ports 5060 (unencrypted) and 5061 (encrypted).

A

Session Initiation Protocol (SIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

This protocol is used for sending error and status messages, like ping.

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A connection-oriented transport protocol that ensures reliable delivery.

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

A connectionless transport protocol that is faster but doesn’t guarantee delivery.

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Encapsulates packets for tunneling through IP networks.

A

Generic Routing Encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A suite of protocols that secure IP communications through encryption and authentication.

A

Internet Protocol Security (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

An IPSec protocol that provides authentication and integrity, but no encryption.

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

An IPSec protocol that provides encryption, integrity, and authentication.

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

The key management protocol used in IPSec to establish secure sessions.

A

Internet Key Exchange (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

A one-to-one communication between a single sender and a single receiver.

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

A one-to-many communication to multiple specific recipients.

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

A one-to-nearest communication that routes to the closest node in a group.

A

Anycast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

A one-to-all communication sent to all devices on the network segment.

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which protocol uses port 443 to secure web traffic?
A. HTTP
B. FTP
C. HTTPS
D. SSH

A

C. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which protocol is used to send system logs over port 514?
A. SNMP
B. Syslog
C. LDAP
D. SMTP

A

B. Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is the primary function of DHCP?
A. File sharing
B. Email delivery
C. IP address assignment
D. DNS resolution

A

C. IP address assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which protocol uses port 22 for secure remote login and file transfer?
A. Telnet
B. FTP
C. SSH
D. HTTP

A

C. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which protocol is used for resolving domain names to IP addresses?
A. SMTP
B. DNS
C. DHCP
D. SNMP

A

B. DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Which port is used by SQL Server?
A. 3389
B. 1433
C. 161
D. 514

A

B. 1433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which of the following is a connection-oriented protocol that ensures reliable delivery?
A. UDP
B. TCP
C. ICMP
D. GRE

A

B. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which protocol is used to encapsulate data for tunneling across IP networks?
A. ICMP
B. IPSec
C. GRE
D. SNMP

A

C. GRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Which IPSec protocol ensures encryption, integrity, and authentication?
A. AH
B. ESP
C. GRE
D. IKE

A

B. ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Which term describes traffic sent from one device to all others in the same network segment?
A. Unicast
B. Multicast
C. Anycast
D. Broadcast

A

D. Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What type of traffic is directed to the nearest device in a group?
A. Unicast
B. Multicast
C. Anycast
D. Broadcast

A

C. Anycast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Which protocol operates on ports 20 and 21 and transfers files without encryption?
A. SFTP
B. FTP
C. SCP
D. SMB

A

B. FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Which protocol uses port 25 and is used to send email messages?
A. IMAP
B. SMTP
C. SNMP
D. SFTP

A

B. SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which protocol is used for initiating voice or video communication sessions?
A. RDP
B. SIP
C. SMB
D. TFTP

A

B. SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

This set of standards defines wireless LAN communication, including 802.11a/b/g/n/ac/ax.

A

802.11 Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

This wireless technology enables data transmission over mobile networks like 4G and 5G.

A

Cellular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

This wireless technology uses orbiting satellites to provide network connectivity.

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

This set of IEEE standards governs Ethernet communication over twisted pair and fiber.

A

802.3 Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

This type of fiber uses a single path of light for long-distance, high-bandwidth connections.

A

Single-mode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

This type of fiber uses multiple paths of light and is suited for shorter distances.

A

Multimode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

This copper cable directly connects servers and storage with minimal latency, often using Twinax.

A

Direct Attach Copper (DAC) Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

This is a type of DAC cable made with two inner conductors and is used in short-distance high-speed networking.

A

Twinaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

This older cable type uses a central conductor and shielding, commonly found in cable internet.

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

This refers to the maximum data transfer rates supported by various media types.

A

Cable Speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

This cable jacket type is fire-resistant and emits minimal toxic smoke; required in air-handling spaces.

A

Plenum Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

This cable jacket type is not rated for fire-resistance and is cheaper but limited in use.

A

Non-Plenum Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

This protocol is commonly used for LAN communication over twisted pair or fiber.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

This high-speed network protocol is primarily used in storage area networks (SANs).

A

Fibre Channel (FC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

This hot-swappable transceiver module supports Ethernet and fiber and is commonly used in switches and routers.

A

Small Form-Factor Pluggable (SFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

This transceiver module supports four channels and is commonly used in high-speed data centers.

A

Quad Small Form-Factor Pluggable (QSFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

This fiber optic connector uses a push-pull mechanism and is square-shaped.

A

Subscriber Connector (SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

This small fiber optic connector resembles an RJ45 and is commonly used in SFP modules.

A

Local Connector (LC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

This fiber optic connector uses a bayonet-style twist lock and is cylindrical.

A

Straight Tip (ST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

This fiber optic connector supports multiple fibers in a single rectangular connector.

A

Multi-fiber Push On (MPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

This RJ-style connector is used with telephone lines.

132
Q

This RJ-style connector is used for Ethernet networking.

133
Q

This threaded coaxial connector is commonly used for cable modems and TVs.

134
Q

This coaxial connector uses a bayonet-style locking mechanism and is often used for video or legacy Ethernet.

A

Bayonet Neill–Concelman (BNC)

135
Q

Which IEEE standard defines Ethernet over twisted pair and fiber?
A. 802.11
B. 802.3
C. 802.15
D. 802.1X

136
Q

Which fiber type is designed for short-distance communication using multiple paths of light?
A. Single-mode
B. Multimode
C. Coaxial
D. DAC

A

B. Multimode

137
Q

Which type of cable is fire-resistant and suitable for use in air ducts?
A. Non-Plenum
B. Coaxial
C. Shielded Twisted Pair
D. Plenum

138
Q

Which connector is most commonly used for Ethernet networking?
A. RJ11
B. F-type
C. RJ45
D. SC

139
Q

Which type of transceiver supports four channels and is used in high-speed data centers?
A. SFP
B. QSFP
C. BNC
D. MPO

140
Q

Which protocol is typically used in a SAN environment for high-speed data transfer?
A. Ethernet
B. Fibre Channel
C. TCP/IP
D. SNMP

A

B. Fibre Channel

141
Q

Which connector uses a push-pull design and is square-shaped, common in fiber optic networks?
A. ST
B. RJ11
C. SC
D. BNC

142
Q

Which of the following transmission media is used in Direct Attach Copper (DAC) connections?
A. Coaxial
B. Fiber
C. Twinaxial
D. Plenum

A

C. Twinaxial

143
Q

Which wireless technology provides long-distance communication using satellites?
A. Cellular
B. Wi-Fi
C. Satellite
D. ZigBee

A

C. Satellite

144
Q

Which connector is commonly used with coaxial cables for cable modems and TVs?
A. SC
B. F-Type
C. RJ45
D. MPO

145
Q

This topology connects every node directly to every other node, offering high redundancy.

146
Q

This topology combines two or more topologies (e.g., mesh and star) for flexibility and scalability.

147
Q

In this topology, all devices connect to a central node (like a switch or hub) that manages communication.

A

Star / Hub and Spoke

148
Q

This modern data center topology has spine switches connected to all leaf switches to reduce latency.

A

Spine and Leaf

149
Q

This is the simplest topology with a dedicated link between two devices.

A

Point to Point

150
Q

This architecture uses three layers—core, distribution, and access—to segment traffic and functions.

A

Three-Tier Hierarchical Model

151
Q

This layer of the hierarchical model provides fast switching and routing between distribution layers.

A

Core Layer

152
Q

This layer aggregates traffic from the access layer and applies routing policies.

A

Distribution Layer

153
Q

This layer provides endpoint access, typically involving switches or wireless access points.

A

Access Layer

154
Q

This architecture merges the core and distribution layers into a single layer to reduce complexity.

A

Collapsed Core

155
Q

This traffic flow refers to data traveling between endpoints and centralized resources like servers or the cloud.

A

North-South Traffic

156
Q

This traffic flow refers to data moving laterally between devices within the same data center or layer.

A

East-West Traffic

157
Q

This topology is highly fault-tolerant because multiple redundant paths exist between devices.

158
Q

This topology is expensive and complex to implement due to the number of connections required.

159
Q

This topology allows organizations to combine different topologies based on specific needs for flexibility and scalability.

160
Q

This topology is commonly used in enterprise environments where some segments use star and others use mesh.

161
Q

This topology is simple to manage and isolate faults, since all devices connect to a central point.

A

Star / Hub and Spoke

162
Q

A downside of this topology is that a central device failure can take down the entire network.

A

Star / Hub and Spoke

163
Q

This topology reduces bottlenecks in east-west traffic in large-scale data centers.

A

Spine and Leaf

164
Q

In this topology, spine switches are at the top level and connect to every leaf switch without connecting to each other.

A

Spine and Leaf

165
Q

This topology is ideal for direct connections between two locations, such as site-to-site links or two routers.

A

Point to Point

166
Q

This topology lacks redundancy, as only a single path exists between devices.

A

Point to Point

167
Q

This architecture separates core, distribution, and access functions for modularity and scalability.

A

Three-Tier Hierarchical Model

168
Q

This model improves network performance and design by localizing traffic within layers.

A

Three-Tier Hierarchical Model

169
Q

This architecture simplifies network design by combining core and distribution layers, reducing cost and complexity.

A

Collapsed Core

170
Q

This architecture is common in smaller enterprise networks that don’t need full three-tier separation.

A

Collapsed Core

171
Q

North-south traffic typically describes communication between internal users and external servers or cloud applications.

A

North-South Traffic

172
Q

East-west traffic refers to lateral communication between internal resources, such as between virtual machines or application tiers.

A

East-West Traffic

173
Q

East-west traffic optimization is a key goal of spine-leaf and software-defined network designs.

A

East-West Traffic

174
Q

Which network topology connects every device directly to every other device?
A. Star
B. Mesh
C. Point to Point
D. Hybrid

175
Q

Which topology combines multiple types of topologies in one network design?
A. Spine and Leaf
B. Hybrid
C. Star
D. Mesh

176
Q

Which data center topology connects each leaf switch to all spine switches for high performance?
A. Hub and Spoke
B. Three-Tier
C. Spine and Leaf
D. Mesh

A

C. Spine and Leaf

177
Q

In the three-tier model, which layer is responsible for high-speed backbone connectivity?
A. Access
B. Distribution
C. Core
D. Collapsed Core

178
Q

Which type of traffic flow describes data going from users to servers or cloud resources?
A. East-West
B. North-South
C. Hub-Spoke
D. Star

A

B. North-South

179
Q

Which architecture simplifies network design by combining the core and distribution layers?
A. Spine and Leaf
B. Mesh
C. Collapsed Core
D. Hybrid

A

C. Collapsed Core

180
Q

Which topology has devices connected through a central hub, common in small networks?
A. Star / Hub and Spoke
B. Point to Point
C. Mesh
D. Leaf-Spine

A

A. Star / Hub and Spoke

181
Q

What is a key benefit of the point-to-point topology?
A. Redundancy
B. Simplicity
C. Scalability
D. Broadcast support

A

B. Simplicity

182
Q

Which traffic flow refers to communication between devices in the same data center layer or segment?
A. North-South
B. East-West
C. Core
D. Leaf-Spine

A

B. East-West

183
Q

This type of IP address is routable over the internet and must be unique across the global network.

A

Public IP Address

184
Q

This type of IP address is not routable on the internet and is used within internal networks.

A

Private IP Address

185
Q

This is a non-routable address range automatically assigned when DHCP fails.

A

Automatic Private IP Addressing (APIPA)

186
Q

This set of IP ranges (defined by an RFC) is reserved for internal/private use.

187
Q

This IP address range (127.0.0.0/8) is used for internal testing and communication with the host machine.

A

Loopback / Localhost

188
Q

This subnetting method allows networks to use different subnet mask lengths for more efficient IP allocation.

A

Variable Length Subnet Mask (VLSM)

189
Q

This IP addressing method removes the traditional class system, using prefix notation to define networks.

A

Classless Inter-Domain Routing (CIDR)

190
Q

This IPv4 class supports extremely large networks with a default mask of /8 and a range from 1.0.0.0 to 126.255.255.255.

191
Q

This IPv4 class supports medium-sized networks with a default mask of /16 and a range from 128.0.0.0 to 191.255.255.255.

192
Q

This IPv4 class supports smaller networks with a default mask of /24 and a range from 192.0.0.0 to 223.255.255.255.

193
Q

This IPv4 class is reserved for multicast traffic (224.0.0.0 to 239.255.255.255).

194
Q

This IPv4 class is reserved for experimental use (240.0.0.0 to 255.255.255.254).

195
Q

The private IP ranges are: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

196
Q

These addresses must be assigned by IANA or a regional registry to ensure global uniqueness.

A

Public IP Address

197
Q

Used for internal networks and must be translated via NAT for internet access.

A

Private IP Address

198
Q

Addresses in the 169.254.0.0/16 range are assigned when a DHCP server is unreachable.

A

Automatic Private IP Addressing (APIPA)

199
Q

Used to test TCP/IP stack functionality without accessing the physical network.

A

Loopback / Localhost

200
Q

Enables subnetting a subnet for better IP address utilization in hierarchical networks.

A

Variable Length Subnet Mask (VLSM)

201
Q

Expresses IP networks using prefix length (e.g., /24) instead of class boundaries.

A

Classless Inter-Domain Routing (CIDR)

202
Q

Offers over 16 million host addresses and is used by very large networks.

203
Q

Supports up to 65,534 hosts and is often used by large organizations.

204
Q

Supports up to 254 hosts and is ideal for small networks.

205
Q

Used for multicast groups, not regular unicast communication.

206
Q

Experimental and reserved; not used in standard networking.

207
Q

Which of the following is a private IP address?
A. 192.0.2.1
B. 172.20.15.10
C. 8.8.8.8
D. 198.51.100.4

A

B. 172.20.15.10

208
Q

Which class of IP addresses allows for 16,777,214 hosts per network?
A. Class B
B. Class C
C. Class D
D. Class A

A

D. Class A

209
Q

Which IPv4 address is used for loopback testing?
A. 0.0.0.0
B. 169.254.0.1
C. 127.0.0.1
D. 192.168.1.1

A

C. 127.0.0.1

210
Q

What does APIPA assign when a device fails to get a DHCP address?
A. 127.0.0.1
B. 0.0.0.0
C. 192.168.1.1
D. 169.254.x.x

A

D. 169.254.x.x

211
Q

Which addressing scheme replaces classful addressing with subnet masks in slash notation?
A. VLSM
B. CIDR
C. APIPA
D. NAT

212
Q

Which IP class is used for multicast traffic?
A. Class A
B. Class C
C. Class D
D. Class E

A

C. Class D

213
Q

Which subnetting technique allows multiple subnet masks within the same network?
A. CIDR
B. NAT
C. VLSM
D. DHCP

214
Q

This networking model separates the control plane from the data plane for centralized network management.

A

Software-Defined Network (SDN)

215
Q

This WAN architecture applies SDN concepts to wide area networks for greater flexibility and efficiency.

A

Software-Defined Wide Area Network (SD-WAN)

216
Q

This feature allows network policies to adjust based on the type or priority of application traffic.

A

Application Aware

217
Q

This feature allows devices to be deployed and configured automatically without manual setup.

A

Zero-Touch Provisioning

218
Q

This design allows WAN connections to function across multiple underlying transport types (MPLS, LTE, broadband, etc.).

A

Transport Agnostic

219
Q

This SDN/SD-WAN feature allows policies to be managed from a centralized controller.

A

Central Policy Management

220
Q

This network technology enables Layer 2 communication across Layer 3 boundaries using encapsulation.

A

Virtual Extensible LAN (VXLAN)

221
Q

This VXLAN use case connects two geographically separate data centers at Layer 2.

A

Data Center Interconnect (DCI)

222
Q

This technique encapsulates Layer 2 Ethernet frames inside Layer 3 packets for greater flexibility.

A

Layer 2 Encapsulation

223
Q

This security model enforces granular controls where every user and device must be explicitly verified.

A

Zero Trust Architecture (ZTA)

224
Q

This component of ZTA evaluates users or devices before granting access to a network resource.

A

Policy-Based Authentication

225
Q

This ZTA principle allows users or devices only the access required for their role—nothing more.

A

Least Privilege Access

226
Q

This cloud-delivered framework integrates networking and security functions at the network edge.

A

Secure Access Service Edge (SASE)

227
Q

This subset of SASE focuses exclusively on delivering security functions from the cloud.

A

Security Service Edge (SSE)

228
Q

This practice uses code to manage and provision IT infrastructure automatically.

A

Infrastructure as Code (IaC)

229
Q

In IaC, these prewritten scripts define reusable configurations and automation tasks.

A

Playbooks/Templates/Reusable Tasks

230
Q

IaC helps detect and correct unintended changes to configurations over time.

A

Configuration Drift / Compliance

231
Q

IaC can automate versioned rollouts of new features or patches.

232
Q

This technique allows tools to discover and adjust to active resources in real time.

A

Dynamic Inventories

233
Q

This tracks changes to infrastructure code over time and allows rollback if needed.

A

Version Control

234
Q

This shared space stores infrastructure code and makes it accessible to collaborators.

A

Central Repository

235
Q

This version control feature identifies and flags overlapping changes made by multiple users.

A

Conflict Identification

236
Q

This technique allows developers to work on separate changes independently before merging.

237
Q

This IP addressing standard solves IPv4 exhaustion by expanding the address space.

238
Q

This IPv6 mechanism allows IPv6 and IPv4 to coexist by enabling communication between them.

A

Dual Stack

239
Q

This compatibility technique wraps IPv6 packets inside IPv4 for transport.

240
Q

This protocol translates IPv6 addresses to IPv4 so IPv6 clients can access IPv4-only services.

241
Q

This SDN/SD-WAN feature improves application performance by dynamically routing based on the type of traffic.

A

Application Aware

242
Q

Zero-touch provisioning is ideal for branch office rollouts where manual configuration would be too costly or slow.

A

Zero-Touch Provisioning

243
Q

Being transport agnostic allows SD-WAN to prioritize business-critical traffic across whatever links are available.

A

Transport Agnostic

244
Q

Centralized policy management lets admins enforce consistent configurations across all locations from a single console.

A

Central Policy Management

245
Q

VXLAN allows networks to overcome VLAN ID limitations (4096) by supporting up to 16 million segments.

A

Virtual Extensible LAN (VXLAN)

246
Q

DCI (Data Center Interconnect) enables seamless Layer 2 connectivity between geographically separate facilities.

A

Data Center Interconnect (DCI)

247
Q

Layer 2 encapsulation with VXLAN allows VMs to migrate between sites without changing IPs.

A

Layer 2 Encapsulation

248
Q

Zero trust assumes no device or user is inherently trusted, even inside the perimeter.

A

Zero Trust Architecture (ZTA)

249
Q

Policy-based authentication uses device posture, user identity, and location to make access decisions.

A

Policy-Based Authentication

250
Q

Least privilege access limits the damage a compromised user or device can cause by restricting access.

A

Least Privilege Access

251
Q

SASE unifies SD-WAN with cloud-based security tools like CASB, firewall-as-a-service, and secure web gateways.

A

Secure Access Service Edge (SASE)

252
Q

SSE delivers security features without SD-WAN functionality, focusing on cloud-native security tools.

A

Security Service Edge (SSE)

253
Q

Infrastructure as Code reduces human error by codifying configurations that can be tested and reused.

A

Infrastructure as Code (IaC)

254
Q

Playbooks and templates improve consistency by standardizing configuration across multiple environments.

A

Playbooks/Templates/Reusable Tasks

255
Q

IaC detects drift when the current configuration deviates from the declared state in code.

A

Configuration Drift / Compliance

256
Q

IaC can safely roll out updates by scripting and versioning infrastructure changes.

257
Q

Dynamic inventory systems (like those used in Ansible) update host lists in real time from cloud platforms.

A

Dynamic Inventories

258
Q

Version control systems track all changes, allowing teams to revert to known-good states.

A

Version Control

259
Q

A central repository, such as GitHub, serves as the authoritative source for infrastructure code.

A

Central Repository

260
Q

Conflict identification occurs when multiple contributors modify the same lines of code.

A

Conflict Identification

261
Q

Branching enables developers to work independently on features or fixes without impacting production code.

262
Q

IPv6 eliminates the need for NAT by offering a vastly larger address space.

A

Mitigating Address Exhaustion (IPv6)

263
Q

Dual stack allows devices to handle both IPv4 and IPv6 traffic during the transition period.

A

Dual Stack

264
Q

Tunneling techniques (like 6to4 or ISATAP) enable IPv6 traffic to traverse IPv4 networks.

265
Q

NAT64 allows IPv6-only clients to access IPv4-only services by translating address formats.

266
Q

Which technology separates the control plane from the data plane for centralized network control?
A. VLAN
B. SDN
C. NAT
D. MPLS

267
Q

Which solution extends SDN principles to WANs for more efficient routing and policy control?
A. VXLAN
B. SD-WAN
C. OSPF
D. DMVPN

268
Q

Which SD-WAN feature allows a network to operate over various transport types like MPLS, LTE, or broadband?
A. Dual Stack
B. Application-aware routing
C. Transport Agnostic
D. NAT64

A

C. Transport Agnostic

269
Q

What is the purpose of Zero-Touch Provisioning in modern networks?
A. Manually configure all devices
B. Encrypt endpoint traffic
C. Automatically deploy devices without user intervention
D. Prevent configuration drift

A

C. Automatically deploy devices without user intervention

270
Q

Which protocol allows Layer 2 networks to be extended across Layer 3 boundaries?
A. GRE
B. SD-WAN
C. VXLAN
D. SNMP

271
Q

What is the main benefit of Zero Trust Architecture (ZTA)?
A. Static IP addressing
B. Centralized authentication
C. Implicit trust for internal devices
D. Continuous authentication and least privilege access

A

D. Continuous authentication and least privilege access

272
Q

Which security model allows granular access based on user roles and context?
A. SASE
B. Zero Trust
C. VPN
D. VLAN

A

B. Zero Trust

273
Q

Which model delivers both networking and security functions as cloud-based services?
A. SDN
B. SSE
C. MPLS
D. SASE

274
Q

What does Infrastructure as Code (IaC) enable?
A. Manual server provisioning
B. Static network topologies
C. Automated infrastructure deployment using code
D. Real-time encryption of VLANs

A

C. Automated infrastructure deployment using code

275
Q

Which IaC concept ensures that systems match the intended configuration over time?
A. Playbooks
B. Configuration Drift / Compliance
C. NAT64
D. Branching

A

B. Configuration Drift / Compliance

276
Q

What allows IPv6 devices to communicate with IPv4-only devices?
A. NAT64
B. Dual Stack
C. VXLAN
D. SD-WAN

277
Q

Which IPv6 transition method enables simultaneous use of IPv4 and IPv6?
A. Tunneling
B. Dual Stack
C. NAT64
D. CIDR

A

B. Dual Stack

278
Q

Which version control feature helps identify overlapping changes to infrastructure code?
A. Branching
B. Playbooks
C. Conflict Identification
D. Dynamic Inventory

A

C. Conflict Identification

279
Q

This Ethernet standard supports 10 Mbps over twisted pair copper cables with a maximum distance of 100 meters.

280
Q

This Ethernet standard provides 100 Mbps over twisted pair copper cables, typically Cat5 or higher, up to 100 meters.

A

100Base-TX

281
Q

A gigabit Ethernet standard that uses twisted pair copper cables (Cat5e or Cat6) with a maximum range of 100 meters.

A

1000Base-T

282
Q

A fiber optic Ethernet standard that supports 1 Gbps over multimode fiber (MMF) with a maximum distance of 550 meters.

A

1000Base-SX

283
Q

A fiber optic Ethernet standard for 1 Gbps that uses single-mode fiber (SMF) with a range up to 10 kilometers.

A

1000Base-LX

284
Q

This Ethernet standard supports 10 Gbps over multimode fiber up to 300 meters.

A

10GBase-SR

285
Q

A 10 Gbps Ethernet standard that uses single-mode fiber with a maximum range of 10 kilometers.

A

10GBase-LR

286
Q

This copper Ethernet standard supports 10 Gbps over Cat6a or Cat7 cables with a range of up to 100 meters.

287
Q

A high-speed Ethernet standard designed for data centers, providing 40 Gbps over multimode fiber up to 150 meters.

A

40GBase-SR4

288
Q

An Ethernet standard that supports 40 Gbps over single-mode fiber with distances up to 10 kilometers.

A

40GBase-LR4

289
Q

This standard supports ultra-fast data transfer at 100 Gbps using multimode fiber with a maximum distance of 150 meters.

A

100GBase-SR4

290
Q

An Ethernet standard designed for long-distance 100 Gbps transmission over single-mode fiber up to 40 kilometers.

A

100GBase-LR4

291
Q

A copper-based Ethernet standard that provides up to 2.5 Gbps over existing Cat5e or Cat6 cables.

A

2.5GBase-T

292
Q

This standard supports 5 Gbps Ethernet using Cat5e or Cat6 cables, extending the usability of current infrastructure.

293
Q

Designed for long-range fiber optic Ethernet, this standard supports 10 Gbps over single-mode fiber with a reach of up to 40 kilometers.

A

10GBase-ER

294
Q

A legacy Ethernet standard that provides 10 Mbps over coaxial cable, primarily used in older networks.

295
Q

An Ethernet standard that supports 10 Mbps over coaxial cable using a bus topology with a maximum segment length of 500 meters.

296
Q

This standard uses fiber optic cables to provide Ethernet at 100 Mbps over distances up to 2 kilometers.

A

100Base-FX

297
Q

A legacy Ethernet standard running at 10 Mbps over twisted pair copper. Although outdated, it was a popular choice for early LAN networks.

298
Q

This Fast Ethernet standard reaches speeds of 100 Mbps using twisted pair copper cables like Cat5 or higher. It uses two pairs of wires for transmission.

A

100Base-TX

299
Q

A gigabit Ethernet standard that operates over copper cables (Cat5e or Cat6) with a range of 100 meters. It is widely used in modern networks for high-speed LANs.

A

1000Base-T

300
Q

Designed for use in data centers and LANs, this standard uses multimode fiber to provide 1 Gbps speeds at distances up to 550 meters.

A

1000Base-SX

301
Q

This fiber standard uses single-mode fiber to transmit 1 Gbps over long distances, often used for WAN connections up to 10 kilometers.

A

1000Base-LX

302
Q

A short-range fiber standard designed for 10 Gbps Ethernet over multimode fiber. It’s commonly deployed in data centers with runs up to 300 meters.

A

10GBase-SR

303
Q

Providing 10 Gbps Ethernet over single-mode fiber, this standard is ideal for long-distance WAN connections, supporting ranges up to 10 kilometers.

A

10GBase-LR

304
Q

This standard enables 10 Gbps Ethernet over twisted pair copper cables, using Cat6a or Cat7. It can support up to 100 meters of transmission.

305
Q

Designed for high-speed connectivity within data centers, this Ethernet standard supports 40 Gbps over multimode fiber, with distances up to 150 meters.

A

40GBase-SR4

306
Q

Using single-mode fiber, this 40 Gbps Ethernet standard is used for long-distance communication, reaching up to 10 kilometers.

A

40GBase-LR4

307
Q

Supporting ultra-fast data transfer at 100 Gbps, this standard operates over multimode fiber with a maximum range of 150 meters.

A

100GBase-SR4

308
Q

Designed for WAN and metropolitan area networks, this Ethernet standard provides 100 Gbps over single-mode fiber for distances up to 40 kilometers.

A

100GBase-LR4

309
Q

Providing an upgrade path for existing networks, this Ethernet standard offers 2.5 Gbps over Cat5e or Cat6 cables for up to 100 meters.

A

2.5GBase-T

310
Q

This copper standard supports speeds up to 5 Gbps using Cat5e or Cat6 cables, balancing speed and cost-effectiveness in modern networks.

311
Q

An extended range fiber optic Ethernet standard, this provides 10 Gbps over single-mode fiber with a range of up to 40 kilometers.

A

10GBase-ER

312
Q

A legacy Ethernet standard operating at 10 Mbps over coaxial cable. Once common in LANs, it is now obsolete.

313
Q

An older Ethernet standard using coaxial cable to provide 10 Mbps over a bus topology, supporting segment lengths up to 500 meters.

314
Q

Designed for Fast Ethernet over fiber optic cable, this standard provides 100 Mbps at distances up to 2 kilometers using multimode fiber.

A

100Base-FX

315
Q

Which Ethernet standard provides 10 Mbps over twisted pair copper cables up to 100 meters?
A. 10Base-T
B. 100Base-TX
C. 1000Base-T
D. 10GBase-T

A

A. 10Base-T

316
Q

Which Ethernet standard is designed for 1 Gbps transmission using multimode fiber up to 550 meters?
A. 1000Base-SX
B. 1000Base-LX
C. 10GBase-SR
D. 10GBase-LR

A

A. 1000Base-SX

317
Q

Which of the following supports 10 Gbps over Cat6a or Cat7 cables up to 100 meters?
A. 10Base-T
B. 100Base-TX
C. 10GBase-T
D. 1000Base-T

A

C. 10GBase-T

318
Q

What is the maximum range for 1000Base-LX over single-mode fiber?
A. 550 meters
B. 10 kilometers
C. 300 meters
D. 40 kilometers

A

B. 10 kilometers

319
Q

A network engineer needs to establish a 40 Gbps connection in a data center over a distance of 100 meters using multimode fiber. Which standard should be used?
A. 40GBase-SR4
B. 40GBase-LR4
C. 10GBase-T
D. 1000Base-SX

A

A. 40GBase-SR4

320
Q

Which Ethernet standard offers speeds of 5 Gbps over Cat5e or Cat6 cables?
A. 2.5GBase-T
B. 5GBase-T
C. 1000Base-T
D. 10GBase-T

A

B. 5GBase-T

321
Q

Which legacy Ethernet standard used coaxial cable in a bus topology, supporting 10 Mbps over distances up to 500 meters?
A. 10Base2
B. 10Base5
C. 10Base-T
D. 100Base-FX

A

B. 10Base5

322
Q

A company requires a long-distance 10 Gbps link over single-mode fiber. Which standard should they select?
A. 10GBase-SR
B. 10GBase-LR
C. 1000Base-SX
D. 10GBase-T

A

B. 10GBase-LR

323
Q

Which Ethernet standard supports speeds of 100 Gbps using multimode fiber over short distances up to 150 meters?
A. 100GBase-SR4
B. 100GBase-LR4
C. 10GBase-SR
D. 40GBase-SR4

A

A. 100GBase-SR4

324
Q

A technician needs to provide Fast Ethernet connectivity over fiber for up to 2 kilometers. Which standard is most suitable?
A. 100Base-FX
B. 100Base-TX
C. 1000Base-SX
D. 10Base-T

A

A. 100Base-FX

325
Q

In this mode, IPsec protects the payload of the original IP packet, leaving the original IP header intact. This mode is often used for end-to-end communication between devices.

A

Transport Mode

326
Q

In this mode, IPsec encrypts and encapsulates the entire IP packet within a new IP header. This mode is commonly used for VPNs to secure communication between networks.

A

Tunnel Mode