NET+ ALL TOPICS Flashcards
Which OSI layer is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A) Transport B) Network C) Presentation D) Session
A) Transport
Which of the following is a feature of VLANs that helps network administrators segment traffic based on business needs? A) Redundancy B) Security C) Speed D) Compression
B) Security
Which IPv4 subnet mask denotes a /24 prefix? A) 255.255.255.0 B) 255.255.0.0 C) 255.255.255.192 D) 255.255.255.248
A) 255.255.255.0
What type of attack involves intercepting legitimate communication and forging a fictitious response to the sender? A) DDoS B) Man-in-the-middle C) Phishing D) SQL Injection
B) Man-in-the-middle
Which command is used to display the IP address configuration of a Windows PC? A) show ip address B) ifconfig C) ipconfig D) netstat
C) ipconfig
In a wireless network, which IEEE standard operates at both 2.4GHz and 5GHz frequencies? A) 802.11g B) 802.11n C) 802.11b D) 802.11a
B) 802.11n
What type of DNS record is used to map domain names to the IP address of the mail server? A) MX B) CNAME C) PTR D) A
A) MX
Which protocol is used for securely accessing remote servers? A) HTTP B) HTTPS C) SSH D) FTP
C) SSH
What is the maximum distance for a single-mode fiber optic cable without needing a repeater? A) 10 km B) 40 km C) 100 km D) 500 km
B) 40 km
Which network topology is highly resilient and allows for easy expansion by adding new nodes? A) Ring B) Bus C) Star D) Mesh
D) Mesh
Which protocol is essential for automatically assigning IP addresses to devices on a network? A) DNS B) DHCP C) FTP D) SMTP
B) DHCP
Which type of cable is used to connect a cable modem to a wall outlet? A) Twisted pair B) Coaxial C) Fiber optic D) HDMI
B) Coaxial
What does the term ‘latency’ refer to in networking? A) The bandwidth of a network B) The error rate of a transmission C) The time it takes for data to travel from source to destination D) The amount of data that can be transmitted in a set amount of time
C) The time it takes for data to travel from source to destination
Which device acts as a gateway to connect different WLANs to a wired Ethernet? A) Modem B) Switch C) Router D) Access Point
C) Router
What is the purpose of the subnet mask in an IP address? A) To differentiate the network portion of the address from the host portion B) To encrypt the IP address for security purposes C) To indicate the class of the IP address D) To extend the length of the IP address
A) To differentiate the network portion of the address from the host portion
Which wireless encryption standard is currently the most secure? A) WEP B) WPA C) WPA2 D) WPA3
D) WPA3
In a Spanning Tree Protocol (STP) network, what is the purpose of the Bridge Protocol Data Units (BPDUs)? A) To prevent routing loops B) To encrypt data C) To prevent broadcast storms D) To elect the root bridge
D) To elect the root bridge
What is the primary benefit of using cloud computing in networking? A) Lower hardware costs B) Higher data throughput C) Improved security D) Physical access to servers
A) Lower hardware costs
Which protocol is used for securely transferring files over the internet? A) HTTP B) FTP C) SFTP D) SMTP
C) SFTP
How does a switch learn the MAC address of devices connected to it? A) It is manually configured by a network administrator. B) It broadcasts a request for the MAC address to all devices. C) It inspects incoming packets and records the MAC addresses. D) It contacts a central database to download a list of MAC addresses.
C) It inspects incoming packets and records the MAC addresses.
Which OSI layer is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A) Transport B) Network C) Presentation D) Sessio (variation 2).
A) Transport
Which of the following is a feature of VLANs that helps network administrators segment traffic based on business needs? A) Redundancy B) Security C) Speed D) Compressio (variation 2).
B) Security
Which IPv4 subnet mask denotes a /24 prefix? A) 255.255.255.0 B) 255.255.0.0 C) 255.255.255.192 D) 255.255.255.24 (variation 2).
A) 255.255.255.0
What type of attack involves intercepting legitimate communication and forging a fictitious response to the sender? A) DDoS B) Man-in-the-middle C) Phishing D) SQL Injectio (variation 2).
B) Man-in-the-middle
Which command is used to display the IP address configuration of a Windows PC? A) show ip address B) ifconfig C) ipconfig D) netsta (variation 2).
C) ipconfig
In a wireless network, which IEEE standard operates at both 2.4GHz and 5GHz frequencies? A) 802.11g B) 802.11n C) 802.11b D) 802.11 (variation 2).
B) 802.11n
What type of DNS record is used to map domain names to the IP address of the mail server? A) MX B) CNAME C) PTR D) (variation 2).
A) MX
Which protocol is used for securely accessing remote servers? A) HTTP B) HTTPS C) SSH D) FT (variation 2).
C) SSH
What is the maximum distance for a single-mode fiber optic cable without needing a repeater? A) 10 km B) 40 km C) 100 km D) 500 k (variation 2).
B) 40 km
Which network topology is highly resilient and allows for easy expansion by adding new nodes? A) Ring B) Bus C) Star D) Mes (variation 2).
D) Mesh
Which protocol is essential for automatically assigning IP addresses to devices on a network? A) DNS B) DHCP C) FTP D) SMT (variation 2).
B) DHCP
Which type of cable is used to connect a cable modem to a wall outlet? A) Twisted pair B) Coaxial C) Fiber optic D) HDM (variation 2).
B) Coaxial
What does the term ‘latency’ refer to in networking? A) The bandwidth of a network B) The error rate of a transmission C) The time it takes for data to travel from source to destination D) The amount of data that can be transmitted in a set amount of tim (variation 2).
C) The time it takes for data to travel from source to destination
Which device acts as a gateway to connect different WLANs to a wired Ethernet? A) Modem B) Switch C) Router D) Access Poin (variation 2).
C) Router
What is the purpose of the subnet mask in an IP address? A) To differentiate the network portion of the address from the host portion B) To encrypt the IP address for security purposes C) To indicate the class of the IP address D) To extend the length of the IP addres (variation 2).
A) To differentiate the network portion of the address from the host portion
Which wireless encryption standard is currently the most secure? A) WEP B) WPA C) WPA2 D) WPA (variation 2).
D) WPA3
In a Spanning Tree Protocol (STP) network, what is the purpose of the Bridge Protocol Data Units (BPDUs)? A) To prevent routing loops B) To encrypt data C) To prevent broadcast storms D) To elect the root bridg (variation 2).
D) To elect the root bridge
What is the primary benefit of using cloud computing in networking? A) Lower hardware costs B) Higher data throughput C) Improved security D) Physical access to server (variation 2).
A) Lower hardware costs
Which protocol is used for securely transferring files over the internet? A) HTTP B) FTP C) SFTP D) SMT (variation 2).
C) SFTP
How does a switch learn the MAC address of devices connected to it? A) It is manually configured by a network administrator. B) It broadcasts a request for the MAC address to all devices. C) It inspects incoming packets and records the MAC addresses. D) It contacts a central database to download a list of MAC addresses (variation 2).
C) It inspects incoming packets and records the MAC addresses.
Which OSI layer is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A) Transport B) Network C) Presentation D) Sessio (variation 3).
A) Transport
Which of the following is a feature of VLANs that helps network administrators segment traffic based on business needs? A) Redundancy B) Security C) Speed D) Compressio (variation 3).
B) Security
Which IPv4 subnet mask denotes a /24 prefix? A) 255.255.255.0 B) 255.255.0.0 C) 255.255.255.192 D) 255.255.255.24 (variation 3).
A) 255.255.255.0
What type of attack involves intercepting legitimate communication and forging a fictitious response to the sender? A) DDoS B) Man-in-the-middle C) Phishing D) SQL Injectio (variation 3).
B) Man-in-the-middle
Which command is used to display the IP address configuration of a Windows PC? A) show ip address B) ifconfig C) ipconfig D) netsta (variation 3).
C) ipconfig
In a wireless network, which IEEE standard operates at both 2.4GHz and 5GHz frequencies? A) 802.11g B) 802.11n C) 802.11b D) 802.11 (variation 3).
B) 802.11n
What type of DNS record is used to map domain names to the IP address of the mail server? A) MX B) CNAME C) PTR D) (variation 3).
A) MX
Which protocol is used for securely accessing remote servers? A) HTTP B) HTTPS C) SSH D) FT (variation 3).
C) SSH
What is the maximum distance for a single-mode fiber optic cable without needing a repeater? A) 10 km B) 40 km C) 100 km D) 500 k (variation 3).
B) 40 km
Which network topology is highly resilient and allows for easy expansion by adding new nodes? A) Ring B) Bus C) Star D) Mes (variation 3).
D) Mesh
Which protocol is essential for automatically assigning IP addresses to devices on a network? A) DNS B) DHCP C) FTP D) SMT (variation 3).
B) DHCP
Which type of cable is used to connect a cable modem to a wall outlet? A) Twisted pair B) Coaxial C) Fiber optic D) HDM (variation 3).
B) Coaxial
What does the term ‘latency’ refer to in networking? A) The bandwidth of a network B) The error rate of a transmission C) The time it takes for data to travel from source to destination D) The amount of data that can be transmitted in a set amount of tim (variation 3).
C) The time it takes for data to travel from source to destination
Which device acts as a gateway to connect different WLANs to a wired Ethernet? A) Modem B) Switch C) Router D) Access Poin (variation 3).
C) Router
What is the purpose of the subnet mask in an IP address? A) To differentiate the network portion of the address from the host portion B) To encrypt the IP address for security purposes C) To indicate the class of the IP address D) To extend the length of the IP addres (variation 3).
A) To differentiate the network portion of the address from the host portion
Which wireless encryption standard is currently the most secure? A) WEP B) WPA C) WPA2 D) WPA (variation 3).
D) WPA3
In a Spanning Tree Protocol (STP) network, what is the purpose of the Bridge Protocol Data Units (BPDUs)? A) To prevent routing loops B) To encrypt data C) To prevent broadcast storms D) To elect the root bridg (variation 3).
D) To elect the root bridge
What is the primary benefit of using cloud computing in networking? A) Lower hardware costs B) Higher data throughput C) Improved security D) Physical access to server (variation 3).
A) Lower hardware costs
Which protocol is used for securely transferring files over the internet? A) HTTP B) FTP C) SFTP D) SMT (variation 3).
C) SFTP
How does a switch learn the MAC address of devices connected to it? A) It is manually configured by a network administrator. B) It broadcasts a request for the MAC address to all devices. C) It inspects incoming packets and records the MAC addresses. D) It contacts a central database to download a list of MAC addresses (variation 3).
C) It inspects incoming packets and records the MAC addresses.
Which OSI layer is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A) Transport B) Network C) Presentation D) Sessio (variation 4).
A) Transport
Which of the following is a feature of VLANs that helps network administrators segment traffic based on business needs? A) Redundancy B) Security C) Speed D) Compressio (variation 4).
B) Security
Which IPv4 subnet mask denotes a /24 prefix? A) 255.255.255.0 B) 255.255.0.0 C) 255.255.255.192 D) 255.255.255.24 (variation 4).
A) 255.255.255.0
What type of attack involves intercepting legitimate communication and forging a fictitious response to the sender? A) DDoS B) Man-in-the-middle C) Phishing D) SQL Injectio (variation 4).
B) Man-in-the-middle
Which command is used to display the IP address configuration of a Windows PC? A) show ip address B) ifconfig C) ipconfig D) netsta (variation 4).
C) ipconfig
In a wireless network, which IEEE standard operates at both 2.4GHz and 5GHz frequencies? A) 802.11g B) 802.11n C) 802.11b D) 802.11 (variation 4).
B) 802.11n
What type of DNS record is used to map domain names to the IP address of the mail server? A) MX B) CNAME C) PTR D) (variation 4).
A) MX
Which protocol is used for securely accessing remote servers? A) HTTP B) HTTPS C) SSH D) FT (variation 4).
C) SSH
What is the maximum distance for a single-mode fiber optic cable without needing a repeater? A) 10 km B) 40 km C) 100 km D) 500 k (variation 4).
B) 40 km
Which network topology is highly resilient and allows for easy expansion by adding new nodes? A) Ring B) Bus C) Star D) Mes (variation 4).
D) Mesh
Which protocol is essential for automatically assigning IP addresses to devices on a network? A) DNS B) DHCP C) FTP D) SMT (variation 4).
B) DHCP
Which type of cable is used to connect a cable modem to a wall outlet? A) Twisted pair B) Coaxial C) Fiber optic D) HDM (variation 4).
B) Coaxial
What does the term ‘latency’ refer to in networking? A) The bandwidth of a network B) The error rate of a transmission C) The time it takes for data to travel from source to destination D) The amount of data that can be transmitted in a set amount of tim (variation 4).
C) The time it takes for data to travel from source to destination
Which device acts as a gateway to connect different WLANs to a wired Ethernet? A) Modem B) Switch C) Router D) Access Poin (variation 4).
C) Router
What is the purpose of the subnet mask in an IP address? A) To differentiate the network portion of the address from the host portion B) To encrypt the IP address for security purposes C) To indicate the class of the IP address D) To extend the length of the IP addres (variation 4).
A) To differentiate the network portion of the address from the host portion
Which wireless encryption standard is currently the most secure? A) WEP B) WPA C) WPA2 D) WPA (variation 4).
D) WPA3
In a Spanning Tree Protocol (STP) network, what is the purpose of the Bridge Protocol Data Units (BPDUs)? A) To prevent routing loops B) To encrypt data C) To prevent broadcast storms D) To elect the root bridg (variation 4).
D) To elect the root bridge
What is the primary benefit of using cloud computing in networking? A) Lower hardware costs B) Higher data throughput C) Improved security D) Physical access to server (variation 4).
A) Lower hardware costs
Which protocol is used for securely transferring files over the internet? A) HTTP B) FTP C) SFTP D) SMT (variation 4).
C) SFTP
How does a switch learn the MAC address of devices connected to it? A) It is manually configured by a network administrator. B) It broadcasts a request for the MAC address to all devices. C) It inspects incoming packets and records the MAC addresses. D) It contacts a central database to download a list of MAC addresses (variation 4).
C) It inspects incoming packets and records the MAC addresses.