2.3 Flashcards

(87 cards)

1
Q

What is the purpose of the OSI model in networking?
- It encrypts data across all layers of the internet
- It defines proprietary standards for hardware manufacturers
- It standardizes network communication by dividing it into 7 distinct layers
- It limits protocol choices to only TCP/IP

A

Answer: It standardizes network communication by dividing it into 7 distinct layers
Practical Use: Helps in diagnosing network issues by isolating problems at specific layers (e.g., checking cabling = Layer 1)
Key Topic: OSI Model
Follow-up: How does the OSI model assist with troubleshooting?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which OSI layer is responsible for end-to-end reliable communication?
- Application Layer (Layer 7)
- Physical Layer (Layer 1)
- Transport Layer (Layer 4)
- Data Link Layer (Layer 2)

A

Answer: Transport Layer (Layer 4)
Practical Use: TCP operates here, ensuring reliable data transfer via acknowledgments and retransmissions
Key Topic: OSI Layer Functions
Follow-up: What protocols operate at the Transport layer?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocols operate at each layer of the OSI model?
- Application: FTP; Presentation: ASCII; Transport: UDP; Network: HTTPS; Data Link: RIP
- Application: DNS; Presentation: Telnet; Transport: FTP; Network: ICMP; Data Link: SSH
- Application: HTTP; Presentation: JPEG; Transport: TCP; Network: IP; Data Link: Ethernet
- Application: Telnet; Presentation: SNMP; Transport: HTTP; Network: SMTP; Data Link: TCP

A

Answer: Application: HTTP; Presentation: JPEG; Transport: TCP; Network: IP; Data Link: Ethernet
Practical Use: Helps map packet behavior to the correct layer
Key Topic: OSI Model Protocols
Follow-up: Which layer handles routing decisions?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many layers are in the TCP/IP model and what are they?
- 5 layers: HTTP, TCP, IP, Ethernet, Fiber
- 3 layers: Application, Routing, Switching
- 4 layers: Application, Transport, Internet, Network Access
- 7 layers: Application to Physical

A

Answer: 4 layers: Application, Transport, Internet, Network Access
Practical Use: Maps directly to real-world protocol stacks; practical for configuring interfaces
Key Topic: TCP/IP Model
Follow-up: Which TCP/IP layer corresponds to the OSI Network Layer?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compare TCP and UDP in terms of reliability and use cases.
- TCP is stateless and UDP requires a handshake
- UDP is more reliable than TCP and uses SSL
- TCP is used only for file transfers, while UDP is used for DNS only
- TCP is reliable and connection-oriented; UDP is faster but connectionless

A

Answer: TCP is reliable and connection-oriented; UDP is faster but connectionless
Practical Use: Choose TCP for accuracy; UDP for speed
Key Topic: Transport Layer Protocols
Follow-up: Why might you use UDP for video streaming?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a MAC address and how is it structured?
- A device-agnostic software ID for tracking web traffic
- A 12-digit IP address used for routing
- A 48-bit hexadecimal hardware address with 24-bit OUI and 24-bit device ID
- A 32-bit logical address assigned by DHCP

A

Answer: A 48-bit hexadecimal hardware address with 24-bit OUI and 24-bit device ID
Practical Use: Used by switches to forward frames on LAN
Key Topic: MAC Addressing
Follow-up: Where is the MAC address stored?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the difference between unicast, multicast, and broadcast?
- Unicast: One-to-one; Multicast: One-to-group; Broadcast: One-to-all
- All three send data only to one specific device
- Unicast: One-to-group; Multicast: One-to-all; Broadcast: One-to-one
- Unicast: One-to-all; Multicast: One-to-one; Broadcast: One-to-group

A

Answer: Unicast: One-to-one; Multicast: One-to-group; Broadcast: One-to-all
Practical Use: Multicast reduces bandwidth use for group transmission
Key Topic: Transmission Types
Follow-up: Which type is used in ARP requests?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the key difference between half-duplex and full-duplex?
- Full-duplex requires fiber optics; half-duplex requires coax
- Half-duplex allows data in one direction at a time; full-duplex allows simultaneous communication
- Half-duplex is used by routers; full-duplex is used by hubs
- Full-duplex only works with wireless; half-duplex is wired

A

Answer: Half-duplex allows data in one direction at a time; full-duplex allows simultaneous communication
Practical Use: Switches use full-duplex; hubs use half-duplex
Key Topic: Data Transmission Modes
Follow-up: Which device only supports half-duplex?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are valid port numbers and services?
- 20/21 (FTP), 22 (SSH), 23 (Telnet), 53 (DNS), 80 (HTTP)
- 1000 (FTP), 1025 (HTTPS), 69 (HTTP), 80 (TFTP), 21 (DHCP)
- 443 (FTP), 22 (DNS), 20 (RDP), 80 (IMAP), 110 (BGP)
- 123 (SMTP), 25 (SNMP), 443 (Telnet), 110 (NTP), 67 (POP3)

A

Answer: 20/21 (FTP), 22 (SSH), 23 (Telnet), 53 (DNS), 80 (HTTP)
Practical Use: Useful in firewall configuration and troubleshooting
Key Topic: Port Numbers
Follow-up: Which protocol uses both TCP and UDP on port 53?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between a protocol number and a port number?
- Protocol number identifies Layer 3 protocols; port number identifies Layer 4 services
- Both are used to identify Layer 2 functions
- Protocol numbers are used only in DHCP; ports are used in OSPF
- Protocol numbers are assigned by MAC addresses; port numbers are assigned by IP

A

Answer: Protocol number identifies Layer 3 protocols; port number identifies Layer 4 services
Practical Use: Useful when examining packet headers or configuring ACLs
Key Topic: Protocols vs Ports
Follow-up: What is the protocol number for ICMP?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which protocol uses port 443 and provides secure web communication?
- SSH
- FTP
- HTTPS
- Telnet

A

Answer: HTTPS
Practical Use: HTTPS encrypts web traffic to protect sensitive user data such as passwords and credit card numbers
Key Topic: Secure Ports and Protocols
Follow-up: What port does HTTP use, and what is the key difference?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of ICMP in network communication?
- Assigning IP addresses
- Encrypting traffic between endpoints
- Delivering error messages and diagnostic info
- Resolving MAC addresses

A

Answer: Delivering error messages and diagnostic info
Practical Use: ICMP is used in tools like ping and traceroute to detect network issues
Key Topic: Internet Control Message Protocol (ICMP)
Follow-up: What protocol number is assigned to ICMP?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following best describes a default gateway?
- The server that stores DNS records
- The IP address used to route traffic to other networks
- A device used to manage VLAN traffic
- The first MAC address learned by a switch

A

Answer: The IP address used to route traffic to other networks
Practical Use: Without a default gateway, devices cannot access outside subnets or the internet
Key Topic: Default Gateway
Follow-up: Where would you configure the default gateway on a router?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens if two devices on the same network are assigned the same IP address?
- One device is automatically assigned a new IP
- Both devices will operate with slower speeds
- A conflict occurs and both devices may lose connectivity
- One device will act as a DHCP server

A

Answer: A conflict occurs and both devices may lose connectivity
Practical Use: Duplicate IPs cause connection drops and errors, especially on static assignments
Key Topic: IP Conflict
Follow-up: How can DHCP help prevent this issue?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which protocol resolves IP addresses to MAC addresses?
- DNS
- ICMP
- ARP
- DHCP

A

Answer: ARP
Practical Use: ARP enables Layer 3 IP communication over Layer 2 by mapping MAC addresses
Key Topic: Address Resolution Protocol
Follow-up: What command shows the ARP table on a Windows machine?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of routing protocol uses hop count as its primary metric?
- OSPF
- EIGRP
- RIP
- BGP

A

Answer: RIP
Practical Use: RIP is simple but limited (max 15 hops), often used for small networks or legacy compatibility
Key Topic: Routing Protocols
Follow-up: Why is RIP considered less efficient for large networks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which protocol builds a complete map of the network and uses link-state advertisements?
- RIP
- BGP
- OSPF
- NAT

A

Answer: OSPF
Practical Use: OSPF quickly recalculates routes during outages using its complete network topology database
Key Topic: Link-State Protocols
Follow-up: What algorithm does OSPF use to find the shortest path?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which dynamic routing protocol uses bandwidth and delay as metrics?
- RIP
- EIGRP
- OSPF
- VRRP

A

Answer: EIGRP
Practical Use: EIGRP balances accuracy and performance, allowing more intelligent route decisions
Key Topic: Distance Vector Protocols
Follow-up: What is the DUAL algorithm used by EIGRP?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which scenario best describes a unicast transmission?
- A message sent to all devices on a subnet
- A video stream delivered to multiple subscribers
- A direct message from one device to another
- A routing update sent to neighboring routers

A

Answer: A direct message from one device to another
Practical Use: Most communications like web browsing use unicast to deliver data from a client to a server
Key Topic: Transmission Types
Follow-up: Which transmission type is used by DHCP Discover?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is an example of a Layer 3 device?
- Switch
- Router
- Hub
- Access Point

A

Answer: Router
Practical Use: Routers make decisions based on IP addresses and connect different subnets
Key Topic: Layer 3 Devices
Follow-up: What type of address does a switch use to forward frames?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which port does DNS typically use for queries?
- 80
- 25
- 53
- 443

A

Answer: 53
Practical Use: DNS resolves domain names to IP addresses; critical for nearly all internet traffic
Key Topic: Common Ports
Follow-up: Which protocol uses port 53 with both TCP and UDP?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the role of DHCP in a network?
- Resolve IP to MAC addresses
- Assign IP addresses dynamically
- Route packets between networks
- Encrypt traffic between devices

A

Answer: Assign IP addresses dynamically
Practical Use: DHCP automates IP configuration, reducing manual errors and setup time
Key Topic: Dynamic Host Configuration Protocol
Follow-up: What’s the difference between a DHCP lease and reservation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which layer of the OSI model is responsible for logical addressing and routing? - Layer 1 – Physical - Layer 3 – Network - Layer 5 – Session - Layer 7 – Application
Answer: Layer 3 – Network Practical Use: IP addresses and routers operate at this layer to send packets across networks Key Topic: OSI Network Layer Follow-up: What protocol is commonly used at Layer 3?
26
Which service translates domain names into IP addresses? - DHCP - NAT - DNS - ARP
Answer: DNS Practical Use: DNS enables humans to use readable names instead of IPs for accessing websites Key Topic: Domain Name System Follow-up: What type of DNS record is used for IPv4 address mapping?
27
What does the TTL (Time To Live) field in an IP packet do? - Encrypt the packet’s data - Identify the protocol type - Prevent infinite loops in routing - Store the MAC address
Answer: Prevent infinite loops in routing Practical Use: TTL limits the number of hops a packet can take before being discarded Key Topic: IP Packet Fields Follow-up: What happens when TTL reaches zero?
28
Which protocol is used to retrieve email from a remote server? - SMTP - POP3 - DNS - FTP
Answer: POP3 Practical Use: POP3 downloads email from the mail server to the client and removes it from the server Key Topic: Email Protocols Follow-up: What is the key difference between POP3 and IMAP?
29
Which address is used to identify a device on a local network? - DNS Address - Public IP Address - MAC Address - Subnet Mask
Answer: MAC Address Practical Use: Switches use MAC addresses to forward frames to the correct device on a LAN Key Topic: MAC Addressing Follow-up: How can you find a MAC address in the CLI?
30
Which command can display the path packets take to a destination? - ipconfig - nslookup - traceroute / tracert - arp -a
Answer: traceroute / tracert Practical Use: Identifies each hop between source and destination, useful for network diagnostics Key Topic: Troubleshooting Tools Follow-up: How does traceroute use the TTL field?
31
Which type of address allows devices to communicate over the internet? - Private IP - MAC Address - Loopback Address - Public IP
Answer: Public IP Practical Use: Public IPs are routable across the internet, unlike private IPs which are reserved for LANs Key Topic: Addressing Follow-up: What are the ranges of private IP addresses?
32
What does NAT do in a network environment? - Assigns hostnames - Converts private IP addresses to public IPs - Stores email messages - Translates MAC to IP addresses
Answer: Converts private IP addresses to public IPs Practical Use: NAT allows multiple internal devices to access the internet using a single public IP Key Topic: Network Address Translation Follow-up: What are the two common types of NAT?
33
Front
Back
34
What command would you use to release and renew an IP address in Windows? - netstat - ipconfig /release & ipconfig /renew - ping localhost - arp -d
Answer: ipconfig /release & ipconfig /renew Practical Use: Useful for troubleshooting DHCP and connectivity issues Key Topic: CLI Commands Follow-up: What command would you use to verify the assigned IP address?
35
Which address is not routable on the internet? - 8.8.8.8 - 10.0.0.1 - 142.250.190.78 - 1.1.1.1
Answer: 10.0.0.1 Practical Use: This is a private IP, meant only for internal LAN use Key Topic: Private vs Public IP Follow-up: What other IP ranges are reserved for private use?
36
What does the loopback address 127.0.0.1 represent? - The DNS resolver - The gateway address - The localhost (the device itself) - The first device in a subnet
Answer: The localhost (the device itself) Practical Use: Used to test TCP/IP stack locally without network traffic Key Topic: Loopback Address Follow-up: What happens if you ping 127.0.0.1 and get no response?
37
Which protocol dynamically maps private IPs to public IPs for internet access? - DNS - NAT - DHCP - ARP
Answer: NAT Practical Use: Enables internal devices to communicate with the internet using a single public IP Key Topic: NAT Functionality Follow-up: What are the differences between static and dynamic NAT?
38
Which OSI layer handles encryption and decryption of data? - Layer 3 – Network - Layer 4 – Transport - Layer 6 – Presentation - Layer 7 – Application
Answer: Layer 6 – Presentation Practical Use: SSL/TLS operations occur here before handing off to the application Key Topic: OSI Layers Follow-up: What else does the presentation layer handle besides encryption?
39
Which command would show all current active TCP connections in Windows? - ping - ipconfig - netstat - tracert
Answer: netstat Practical Use: Useful for identifying open ports, connections, and troubleshooting potential threats Key Topic: CLI Utilities Follow-up: What switch can you use with netstat to show process IDs?
40
Which protocol uses three-way handshakes to establish a connection? - UDP - TCP - ICMP - ARP
Answer: TCP Practical Use: Ensures reliable, ordered delivery of data with sequence acknowledgment Key Topic: TCP Functionality Follow-up: What are the three stages of the TCP handshake?
41
Which tool can you use to test name resolution in Windows? - netstat - nslookup - ping - ipconfig
Answer: nslookup Practical Use: Verifies whether DNS is resolving domain names correctly Key Topic: DNS Troubleshooting Follow-up: What command can flush the DNS cache?
42
What is the primary function of a switch in a network? - Assign IP addresses - Forward frames based on MAC addresses - Translate IPs to domains - Filter public traffic from the internet
Answer: Forward frames based on MAC addresses Practical Use: Switches operate at Layer 2 to manage data flow within a LAN Key Topic: Switch Functionality Follow-up: What type of table does a switch use to make decisions?
43
Which device operates only at Layer 1 of the OSI model? - Switch - Hub - Router - Firewall
Answer: Hub Practical Use: Hubs simply repeat electrical signals and cannot filter or route data Key Topic: Network Devices Follow-up: Why are hubs considered obsolete in most modern networks?
44
Front
Back
45
What is the primary function of DNS? - Encrypt communication across networks - Assign IP addresses dynamically - Resolve domain names to IP addresses - Detect duplicate MAC addresses
Answer: Resolve domain names to IP addresses Practical Use: Enables users to access websites by name instead of IP Key Topic: Domain Name System Follow-up: What command can test DNS resolution in Windows?
46
Which protocol uses port 22 and is used for secure remote access? - Telnet - SSH - FTP - SNMP
Answer: SSH Practical Use: SSH provides encrypted command-line access to remote systems Key Topic: Secure Access Protocols Follow-up: How does SSH differ from Telnet?
47
Which wireless security standard is considered the most secure for home Wi-Fi? - WEP - WPA - WPA2 - WPA3
Answer: WPA3 Practical Use: WPA3 provides stronger encryption and protection against brute force attacks Key Topic: Wireless Security Follow-up: What makes WPA3 more secure than WPA2?
48
What does a subnet mask do? - Assigns DNS servers - Determines the network and host portions of an IP address - Encrypts wireless traffic - Assigns MAC addresses
Answer: Determines the network and host portions of an IP address Practical Use: Subnetting allows for efficient IP address allocation Key Topic: Subnetting Follow-up: What is the subnet mask for a /24 network?
49
Which of these IP addresses is a loopback address? - 192.168.1.1 - 169.254.0.1 - 10.1.1.1 - 127.0.0.1
Answer: 127.0.0.1 Practical Use: Used to test TCP/IP stack locally without physical network use Key Topic: Loopback Address Follow-up: What tool can test the loopback interface?
50
Which tool would you use to examine the MAC address table on a switch? - ping - show mac address-table - ipconfig - show ip route
Answer: show mac address-table Practical Use: Used in CLI to view which MAC addresses are learned on which ports Key Topic: Switch Troubleshooting Follow-up: What command clears the MAC address table?
51
Which address is automatically assigned when a device cannot reach a DHCP server? - 10.0.0.1 - 0.0.0.0 - 127.0.0.1 - 169.254.x.x
Answer: 169.254.x.x Practical Use: APIPA assigns a fallback address when DHCP fails Key Topic: Automatic Private IP Addressing (APIPA) Follow-up: Can devices with APIPA communicate outside their subnet?
52
Which protocol is used to send email? - IMAP - SMTP - POP3 - SNMP
Answer: SMTP Practical Use: SMTP is used by mail servers to send outgoing email Key Topic: Email Protocols Follow-up: Which protocol is used to retrieve email and keep it on the server?
53
Which OSI layer is responsible for creating, managing, and terminating sessions? - Layer 4 – Transport - Layer 5 – Session - Layer 6 – Presentation - Layer 7 – Application
Answer: Layer 5 – Session Practical Use: Manages communication sessions between applications Key Topic: OSI Model – Session Layer Follow-up: How is the session layer different from the transport layer?
54
Which IP address class provides the most hosts per network? - Class A - Class B - Class C - Class D
Answer: Class A Practical Use: Class A networks support up to 16 million hosts, used by large organizations Key Topic: IP Address Classes Follow-up: What is the first octet range for a Class A address?
55
Front
Back
56
What is the purpose of the ARP protocol? - Encrypt traffic for secure communication - Assign IP addresses dynamically - Map IP addresses to MAC addresses - Translate domain names to IP addresses
Answer: Map IP addresses to MAC addresses Practical Use: Enables communication between devices on the same local network Key Topic: ARP Functionality Follow-up: What command can display the ARP table on a local machine?
57
Which command shows a device’s IP configuration in Windows? - netstat - arp -a - ipconfig - tracert
Answer: ipconfig Practical Use: Displays IP address, subnet mask, and default gateway Key Topic: Windows CLI Follow-up: What command releases and renews the IP address?
58
Which command checks network connectivity to a remote host? - ping - netstat - ipconfig - nslookup
Answer: ping Practical Use: Uses ICMP to verify reachability and measure response time Key Topic: Network Troubleshooting Follow-up: What does it mean if ping times out?
59
What is the purpose of the “default gateway” in a device’s network settings? - To filter out broadcast traffic - To assign DNS servers - To route traffic to external networks - To convert MAC to IP addresses
Answer: To route traffic to external networks Practical Use: Allows communication beyond the local network or subnet Key Topic: Default Gateway Follow-up: Can a device communicate without a default gateway?
60
What are the first and last usable IPs in a /24 subnet? - First: .0, Last: .255 - First: .1, Last: .254 - First: .2, Last: .253 - First: .0, Last: .254
Answer: First: .1, Last: .254 Practical Use: Helps allocate valid host IPs in network planning Key Topic: Subnetting Follow-up: What is the network address and broadcast address in a /24?
61
What is the difference between static and dynamic IP addressing? - Static changes constantly; dynamic stays the same - Static uses NAT; dynamic doesn’t - Static is manually assigned, dynamic uses DHCP - Static uses ARP; dynamic uses DNS
Answer: Static is manually assigned, dynamic uses DHCP Practical Use: Static is used for servers; dynamic for general client devices Key Topic: IP Addressing Follow-up: Why might you assign a printer a static IP?
62
Which of the following ports is used for HTTP? - 22 - 80 - 443 - 25
Answer: 80 Practical Use: Default port for unencrypted web traffic Key Topic: Common Ports Follow-up: What port is used for secure HTTP?
63
Which device separates broadcast domains in a network? - Switch - Router - Hub - Bridge
Answer: Router Practical Use: Routers segment networks and manage traffic between them Key Topic: Network Devices Follow-up: Which device separates collision domains?
64
What does the command `tracert` do in Windows? - Displays active MAC addresses - Displays ARP cache - Traces the path to a remote host, hop by hop - Clears the DNS cache
Answer: Traces the path to a remote host, hop by hop Practical Use: Helps identify where delays or failures occur in the route Key Topic: Troubleshooting Tools Follow-up: Which field in the IP header is manipulated by `tracert`?
65
Which protocol resolves domain names into IP addresses? - ARP - DHCP - DNS - ICMP
Answer: DNS Practical Use: Required for nearly all internet access, as users enter names, not IPs Key Topic: DNS Resolution Follow-up: What type of record maps a domain to an IPv4 address?
66
Front
Back
67
Which of the following IP ranges is reserved for private Class A networks? - 172.16.0.0 – 172.31.255.255 - 10.0.0.0 – 10.255.255.255 - 192.168.0.0 – 192.168.255.255 - 169.254.0.0 – 169.254.255.255
Answer: 10.0.0.0 – 10.255.255.255 Practical Use: Class A private IPs are often used in large internal networks Key Topic: IP Addressing – Private Ranges Follow-up: Which class uses the 192.168.x.x range?
68
Which protocol is responsible for delivering messages with no guarantee of delivery? - TCP - SSH - UDP - ICMP
Answer: UDP Practical Use: Used in applications like video streaming or VoIP, where speed is prioritized Key Topic: Transport Layer Protocols Follow-up: What are two applications that commonly use UDP?
69
What is the main advantage of using fiber-optic cables over copper cables? - Lower cost - Higher data compression - Immunity to electromagnetic interference - Shorter transmission range
Answer: Immunity to electromagnetic interference Practical Use: Fiber is used in environments with high EMI or long-distance transmission Key Topic: Media Types Follow-up: Which type of fiber is used for long-distance transmission?
70
Which tool is used to test end-to-end continuity of a cable? - Tone generator - Cable tester - Loopback adapter - Crimper
Answer: Cable tester Practical Use: Verifies all wire pairs are connected correctly and identifies breaks Key Topic: Network Tools Follow-up: What tool can locate a specific cable in a bundle?
71
Which of the following is NOT a characteristic of TCP? - Reliable delivery - Connection-oriented - Sequence numbering - Fastest delivery speed
Answer: Fastest delivery speed Practical Use: TCP prioritizes reliability over speed Key Topic: TCP vs UDP Follow-up: Why might a game use UDP instead of TCP?
72
Which device operates primarily at OSI Layer 2? - Router - Hub - Switch - Modem
Answer: Switch Practical Use: Switches forward frames based on MAC addresses and create separate collision domains Key Topic: Network Devices Follow-up: What’s the difference between a Layer 2 and Layer 3 switch?
73
What type of address is 169.254.21.5? - Public - Loopback - APIPA - Reserved
Answer: APIPA Practical Use: Assigned automatically when DHCP fails, used for local-only communication Key Topic: IP Addressing Follow-up: Can APIPA addresses communicate with internet resources?
74
What is the purpose of NAT in a network? - Encrypts network traffic - Prevents IP spoofing - Converts public IPs to private addresses - Allows multiple devices to share one public IP
Answer: Allows multiple devices to share one public IP Practical Use: Common in home networks to conserve IPv4 space Key Topic: NAT Functionality Follow-up: What’s the difference between static and dynamic NAT?
75
Which wireless frequency offers better range but lower speed? - 5 GHz - 4.9 GHz - 2.4 GHz - 6 GHz
Answer: 2.4 GHz Practical Use: Used in larger buildings where wall penetration is needed Key Topic: Wireless Standards Follow-up: What is the trade-off when using 5 GHz over 2.4 GHz?
76
What does a MAC address look like? - 192.168.0.1 - 00:1A:2B:3C:4D:5E - FF:FF:FF:FF:FF:FF - 255.255.255.0
Answer: 00:1A:2B:3C:4D:5E Practical Use: MAC addresses are hardware identifiers used for Layer 2 communication Key Topic: MAC Address Format Follow-up: What command shows your MAC address on Windows?
77
Front
Back
78
Which of the following IP ranges is reserved for private Class A networks? - 172.16.0.0 – 172.31.255.255 - 10.0.0.0 – 10.255.255.255 - 192.168.0.0 – 192.168.255.255 - 169.254.0.0 – 169.254.255.255
Answer: 10.0.0.0 – 10.255.255.255 Practical Use: Class A private IPs are often used in large internal networks Key Topic: IP Addressing – Private Ranges Follow-up: Which class uses the 192.168.x.x range?
79
Which protocol is responsible for delivering messages with no guarantee of delivery? - TCP - SSH - UDP - ICMP
Answer: UDP Practical Use: Used in applications like video streaming or VoIP, where speed is prioritized Key Topic: Transport Layer Protocols Follow-up: What are two applications that commonly use UDP?
80
What is the main advantage of using fiber-optic cables over copper cables? - Lower cost - Higher data compression - Immunity to electromagnetic interference - Shorter transmission range
Answer: Immunity to electromagnetic interference Practical Use: Fiber is used in environments with high EMI or long-distance transmission Key Topic: Media Types Follow-up: Which type of fiber is used for long-distance transmission?
81
Which tool is used to test end-to-end continuity of a cable? - Tone generator - Cable tester - Loopback adapter - Crimper
Answer: Cable tester Practical Use: Verifies all wire pairs are connected correctly and identifies breaks Key Topic: Network Tools Follow-up: What tool can locate a specific cable in a bundle?
82
Which of the following is NOT a characteristic of TCP? - Reliable delivery - Connection-oriented - Sequence numbering - Fastest delivery speed
Answer: Fastest delivery speed Practical Use: TCP prioritizes reliability over speed Key Topic: TCP vs UDP Follow-up: Why might a game use UDP instead of TCP?
83
Which device operates primarily at OSI Layer 2? - Router - Hub - Switch - Modem
Answer: Switch Practical Use: Switches forward frames based on MAC addresses and create separate collision domains Key Topic: Network Devices Follow-up: What’s the difference between a Layer 2 and Layer 3 switch?
84
What type of address is 169.254.21.5? - Public - Loopback - APIPA - Reserved
Answer: APIPA Practical Use: Assigned automatically when DHCP fails, used for local-only communication Key Topic: IP Addressing Follow-up: Can APIPA addresses communicate with internet resources?
85
What is the purpose of NAT in a network? - Encrypts network traffic - Prevents IP spoofing - Converts public IPs to private addresses - Allows multiple devices to share one public IP
Answer: Allows multiple devices to share one public IP Practical Use: Common in home networks to conserve IPv4 space Key Topic: NAT Functionality Follow-up: What’s the difference between static and dynamic NAT?
86
Which wireless frequency offers better range but lower speed? - 5 GHz - 4.9 GHz - 2.4 GHz - 6 GHz
Answer: 2.4 GHz Practical Use: Used in larger buildings where wall penetration is needed Key Topic: Wireless Standards Follow-up: What is the trade-off when using 5 GHz over 2.4 GHz?
87
What does a MAC address look like? - 192.168.0.1 - 00:1A:2B:3C:4D:5E - FF:FF:FF:FF:FF:FF - 255.255.255.0
Answer: 00:1A:2B:3C:4D:5E Practical Use: MAC addresses are hardware identifiers used for Layer 2 communication Key Topic: MAC Address Format Follow-up: What command shows your MAC address on Windows?