CN Practice Questions for ETE
CN Practice Questions for ETE
Correct Answer: B
• By delivering pizzas
• By enabling data and resource sharing
• By predicting the weather
• By composing music
Correct Answer: B
• Baking cookies
• Remote access and mobility
• Gardening
• Skydiving
Correct Answer: B
Correct Answer: B
• Redundancy
• Circular shape
• Mesh connections
• High collision rates
Correct Answer: A
Correct Answer: B
• Bus
• Ring
• Star
• Mesh
Correct Answer: D
Q8. In which topology do all devices share the same communication medium?
• Star
• Ring
• Bus
• Mesh
Correct Answer: C
Correct Answer: B
Q10. How does the collision domain size affect network performance?
Correct Answer: C
• Collision detection
• Collision avoidance
• Collision celebration
• Collision prediction
Correct Answer: B
Correct Answer: D
Correct Answer: D
Q14. How does a switch reduce the size of a broadcast domain compared to a hub?
• By making coffee
• By forwarding broadcasts to all ports
• By isolating devices into separate domains
• By broadcasting louder
Correct Answer: C
Correct Answer: B
Q16. What are the implications of a large broadcast domain on network traffic?
Correct Answer: C
Q17. What is the OSI model, and how many layers does it consist of?
• 4 layers
• 5 layers
• 6 layers
• 7 layers
Correct Answer: D
Q18. In the OSI model, which layer is responsible for data encryption and decryption?
• Physical Layer
• Data Link Layer
• Presentation Layer
• Transport Layer
Correct Answer: C
Q19. Which layer of the OSI model is primarily responsible for routing and logical addressing?
• Network Layer
• Transport Layer
• Session Layer
• Data Link Layer
Correct Answer: A
Q20. What is the primary function of the Transport Layer in the OSI model?
Correct Answer: D
Q21. Which layer of the OSI model deals with error detection and correction at the bit level?
Correct Answer: A
• Data encryption
• Managing user sessions
• Error detection
• Data compression
Correct Answer: B
Q23. How many layers does the TCP/IP model consist of?
• 4 layers
• 5 layers
• 6 layers
• 7 layers
Correct Answer: A
Q24. Which layer of the TCP/IP model corresponds to the OSI model's Transport Layer?
• Internet Layer
• Link Layer
• Transport Layer
• Application Layer
Correct Answer: C
Q25. What is the primary advantage of the TCP/IP model over the OSI model?
Correct Answer: A
Q26. In the TCP/IP model, which layer is responsible for addressing and routing data packets?
• Internet Layer
• Link Layer
• Transport Layer
• Application Layer
Correct Answer: A
Q27. How does the OSI model compare to the TCP/IP model in terms of layer definitions?
Correct Answer: A
Q28. Which model, OSI or TCP/IP, is more commonly used in practical network implementations
today?
• OSI model
• TCP/IP model
• Both are equally popular
• Neither is used anymore
Correct Answer: B
Q29. What are the primary functions of the Physical Layer in a network?
Correct Answer: C
Q30. What is the main advantage of using fiber optic cables over copper cables for data
transmission?
• Lower cost
• Faster transmission speeds
• Greater flexibility
• Easier installation
Correct Answer: B
• Wireless
• Optical fiber
• Infrared
• Microwave
Correct Answer: B
Q32. In wireless communication, what is the purpose of modulation and demodulation (modem)?
Correct Answer: A
• Infrared
• Microwave
• Radio waves
• Bluetooth
Correct Answer: C
Q34. Which of the following wireless technologies is commonly used for satellite-based internet
connections?
• 4G LTE
• Wi-Fi
• VSAT (Very Small Aperture Terminal)
• NFC (Near Field Communication)
Correct Answer: C
Q35. What are the advantages of using microwave transmission for long-distance communication?
Correct Answer: B
• Data encryption
• Signal amplification
• Transmitting and receiving signals
• Routing data packets
Correct Answer: C
Q37. What is latency in network communication, and how does it relate to the Physical Layer?
Correct Answer: A
Q38. What is the key difference between half-duplex and full-duplex communication?
• Half-duplex can transmit data in both directions simultaneously, while full-duplex cannot.
• Half-duplex can only transmit data in one direction at a time, while full-duplex can
transmit in both directions simultaneously.
• Half-duplex uses optical fibers, while full-duplex uses copper cables.
• Half-duplex is used in wireless communication, while full-duplex is used in wired
communication.
Correct Answer: B
Q39. 1. What are the common types of errors that can occur in data transmission over a network?
• Bit errors
• Link errors
• Frame errors
• All of the above
Correct Answer: D
Correct Answer: B
Q41. 3. Which error detection technique uses a polynomial division to calculate a remainder that is
added to the data for error checking?
Correct Answer: A
Correct Answer: B
Q43. 5. Which error correction technique can correct single-bit errors and detect double-bit errors in
data?
• CRC
• Checksum
• Hamming code
• Parity bit
Correct Answer: C
Q44. 6. What is the Hamming distance between two binary words of equal length?
Correct Answer: A
Q45. 7. Which error detection method involves adding an extra bit to the data so that the total
number of 1s is always even (or odd)?
• CRC
• Checksum
• Parity bit
• Hamming code
Correct Answer: C
Q46. 8. What is the purpose of error detection and correction at the Data Link Layer?
• To ensure data confidentiality
• To prevent unauthorized access to the network
• To detect and correct errors in data transmission
• To establish network connections
Correct Answer: C
Q47. 9. Which error detection technique is commonly used in Ethernet networks to detect errors in
frames?
• CRC
• Checksum
• Parity bit
• Hamming code
Correct Answer: A
Q48. 10. In error detection, what is the purpose of the receiver's acknowledgment (ACK) to the
sender?
Correct Answer: B
• Error correction
• Multiple access control
• Data encryption
• Packet routing
Correct Answer: B
Correct Answer: A
Q51. 3. What is the key disadvantage of the pure ALOHA protocol?
Correct Answer: A
Correct Answer: B
• To detect collisions
• To sense the presence of a carrier signal
• To encrypt data packets
• To regulate access to the medium
Correct Answer: B
Q54. 6. How does CSMA/CD (Carrier Sense Multiple Access with Collision Detection) handle
collisions?
• Stations always transmit, and collisions are resolved by the central controller.
• Stations sense the collision and retransmit after a random backoff time.
• Collisions are prevented through strict time-slot allocation.
• Collisions are ignored, and the sender keeps transmitting.
Correct Answer: B
Q55. 7. In CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance), how are collisions
avoided?
Correct Answer: B
Q56. 8. What is the primary advantage of CSMA/CA over CSMA/CD in wireless networks?
• Lower latency
• Higher throughput
• Reduced collisions
• Simplicity of implementation
Correct Answer: C
Q57. 9. Which protocol is commonly used in Ethernet LANs and employs CSMA/CD?
• ALOHA
• Token Ring
• Wi-Fi
• Ethernet
Correct Answer: D
Q58. 10. What is the primary purpose of the contention window in CSMA/CA?
Correct Answer: C
Q59. 1. What does FDMA stand for in the context of channelization protocols?
Correct Answer: A
Q60. 2. In FDMA, how are multiple users allocated channels for communication?
Correct Answer: B
Q61. 3. What is the primary advantage of FDMA in terms of channel allocation?
Correct Answer: C
Q62. 4. What does TDMA stand for in the context of channelization protocols?
Correct Answer: B
Q63. 5. In TDMA, how is the transmission time divided among multiple users sharing the same
channel?
Correct Answer: A
Correct Answer: C
Q65. 1. What is the primary goal of the reservation protocol in controlled access?
• Minimize latency
• Maximize throughput
• Ensure fairness
• Reduce collision probability
Correct Answer: A
Q66. 2. In reservation-based protocols, how are time slots allocated to devices for transmission?
Correct Answer: B
Correct Answer: C
Q68. 1. In polling-based protocols, who controls the communication and polling process?
Correct Answer: B
Correct Answer: C
Q70. 3. What is a potential drawback of polling-based protocols in large networks with many
devices?
Correct Answer: B
Q71. 1. What is the fundamental concept behind token passing protocols in controlled access?
Correct Answer: B
Correct Answer: B
Q73. 3. What is a significant advantage of token passing protocols in controlled access networks?
Correct Answer: B
• 256.1.1
• 10.10.300
• 31.256.0
• 168.1.1000
Correct Answer: D
Q75. Which network class is primarily used for large-scale organizations and provides over 16 million
host addresses?
• g., 10.0.0.0)
• g., 172.16.0.0)
• g., 192.168.0.0)
• g., 224.0.0.0)
Correct Answer: A
Q76. What is the default subnet mask for a Class B network?
• 0.0.0
• 255.0.0
• 255.255.0
• 255.255.255
Correct Answer: B
Q77. Which subnet mask does RIP v1 assume by default when sending route updates?
• 255.255.255)
• 255.255.0)
• 255.0.0)
• 0.0.0)
Correct Answer: C
Q78. What is the multicast address used by RIP v2 for sending route updates?
• 0.0.5
• 0.0.9
• 255.255.255
• 0.0.1
Correct Answer: B
Q79. Which type of protocol does UDP (User Datagram Protocol) represent: connectionless or
connection-oriented?
• Connectionless
• Connection-oriented
• Both connectionless and connection-oriented
• Neither connectionless nor connection-oriented
Correct Answer: A
Q80. TCP (Transmission Control Protocol) is an example of which type of protocol: connectionless or
connection-oriented?
• Connectionless
• Connection-oriented
• Both connectionless and connection-oriented
• Neither connectionless nor connection-oriented
Correct Answer: B
Q81. In a connection-oriented protocol like TCP, what is the purpose of the three-way handshake
during connection establishment?
Correct Answer: C
Q82. In a connection-oriented protocol like TCP, if a segment is not acknowledged by the receiver,
what action does the sender take?
Correct Answer: A
Q83. UDP is often used for real-time applications like streaming and online gaming. What advantage
does UDP offer for these applications?
Correct Answer: B
Q84. What is the primary role of the Transport Layer protocols such as TCP and UDP?
Correct Answer: A
Q85. Which Transport Layer protocol is commonly used for secure, encrypted data transmission on
the web?
• FTP
• HTTPs
• SNMP
• ICMP
Correct Answer: B
Q86. Which Transport Layer protocol is designed for email communication and is responsible for
sending and receiving emails?
• HTTP
• SMTP
• SNMP
• DNS
Correct Answer: B
Q87. Which Transport Layer protocol is often used for file transfer and allows for efficient, bulk data
transfer?
• FTP
• SNMP
• HTTP
• SMTP
Correct Answer: A
Q88. What is the purpose of port numbers in the Transport Layer protocols?
Correct Answer: C
Correct Answer: A
Q90. Which TCP flag is used to initiate the connection setup in the TCP three-way handshake?
• ACK (Acknowledgment)
• SYN (Synchronize)
• RST (Reset)
• FIN (Finish)
Correct Answer: B
Q91. In TCP, what term refers to the process of ensuring that data segments are received by the
destination and in the correct order?
• Segmentation
• Flow control
• Error correction
• Sequence control
Correct Answer: D
Q92. In a TCP connection, which side, the sender or receiver, acknowledges the successful receipt of
data segments?
Correct Answer: B
Q93. What is the purpose of the TCP FIN (Finish) flag during the connection termination process?
Correct Answer: C
Q94. What does the term "handshaking" refer to in the context of the TCP three-way handshake?
Correct Answer: B
Q95. In the TCP three-way handshake, what does the SYN (Synchronize) segment indicate to the
receiving device?
• The sender is ready to receive data
• The sender is terminating the connection
• The sender is synchronizing sequence numbers
• The sender is requesting encryption
Correct Answer: C
Q96. In the TCP three-way handshake, after the client sends a SYN segment, what action does the
server take?
Correct Answer: A
Q97. Which transport layer protocol uses a message format with no header checksum, providing
minimal overhead?
• TCP
• UDP
• IP
• HTTP
Correct Answer: B
Q98. What is the maximum length, in bytes, of the UDP message payload (data) that can be
accommodated in a single packet?
• 512 bytes
• 1,500 bytes
• 65,535 bytes
• 4,096 bytes
Correct Answer: C
Q99. Which field in the TCP message header indicates the number of 32-bit words in the TCP header
itself?
• Window size
• Data offset
• Checksum
• Acknowledgment number
Correct Answer: B
Q100. What field in the TCP message format specifies the maximum number of bytes the sender is
willing to accept in one message?
• Checksum
• Sequence number
• Window size
• Acknowledgment number
Correct Answer: C
Q101. In the TCP message format, what is the purpose of the Urgent Pointer field?
Correct Answer: D
Q102. In congestion control, what does "window-based" congestion control refer to?
Correct Answer: C
Q103. In QoS, what is "jitter," and why is it important to control in real-time communication?
Correct Answer: B
Q104. What is the primary purpose of a token bucket in traffic shaping for QoS?
Correct Answer: C
Q105. Which QoS mechanism involves marking packets with different priority levels based on their
importance or type of traffic?
• Packet switching
• Quality of Service (QoS)
• Traffic shaping
• Packet loss prevention
Correct Answer: B
Q106. What is the primary function of the Domain Name System (DNS) in computer networks?
Correct Answer: B
Q107. What is the significance of a DNS cache in speeding up domain name resolution?
Correct Answer: B
Correct Answer: A
Q109. Which DNS record type is used to specify the mail servers responsible for receiving email for a
domain?
• A (Address)
• PTR (Pointer)
• MX (Mail Exchanger)
• CNAME (Canonical Name)
Correct Answer: C
Correct Answer: B
Q111. Who is credited with inventing email, and when was it first introduced?
Correct Answer: B
Q112. How does the Simple Mail Transfer Protocol (SMTP) play a role in email transmission?
Correct Answer: B
Q113. How does email address formatting adhere to the [email protected] structure?
Correct Answer: B
Q114. What is the purpose of email aliases and distribution lists in email communication?
Correct Answer: D
Q115. How does email support the concept of folders and organizational structures?
Correct Answer: B
Correct Answer: B
Q117. How does FTP handle file transfers between different operating systems?
Correct Answer: B
Q118. What are some common security risks associated with FTP, and how can they be mitigated?
Correct Answer: B
Q119. What are web servers, and how do they serve web content?
Correct Answer: B
Q120. What is the purpose of HTML (Hypertext Markup Language) in web development?
Correct Answer: B
Q121. What is HTTP (Hypertext Transfer Protocol), and what is its primary purpose?
Correct Answer: C
Q122. What is the purpose of cookies in HTTP, and how are they used?
Correct Answer: B
Q123. What is the role of HTTP headers in web communication, and what types of information do
they convey?
Correct Answer: B
Q124. How does SMTP facilitate email transmission between email clients and email servers?
Correct Answer: C
Q125. Explain the roles of SMTP clients (MUAs) and their interactions with SMTP servers in sending
emails.
Correct Answer: A
Q126. How does SMTP ensure the reliability of email delivery, and what mechanisms are in place for
handling failed deliveries?
Correct Answer: C
Q127. What are SNMP agents and managers, and how do they interact in network management?
Correct Answer: B
Q128. What are SNMP community strings, and how do they control access to SNMP-managed
devices?
Correct Answer: B
Q129. What types of information can SNMP provide about network devices and resources?
Correct Answer: B
Q130. What is the purpose of SNMP MIBs (Management Information Bases), and how are they
organized?
Correct Answer: B
Q131. How does network segmentation contribute to security services, and what are some common
segmentation methods?
Correct Answer: C
Q132. What is the role of disaster recovery planning in network security, and how does it ensure
business continuity?
Correct Answer: D
Q133. How does encryption contribute to data security, and what are common encryption
algorithms used in network security?
Correct Answer: A
Q134. What is the purpose of digital signatures in network security, and how do they verify the
authenticity of data?
Correct Answer: C
Q135. Explain the significance of end-to-end encryption in securing data transmission across
networks.
Correct Answer: A
Correct Answer: C
Q137. What cryptographic key is typically used for generating a digital signature?
• Public key
• Private key
• Symmetric key
• Session key
Correct Answer: B
Q138. Explain the concept of a revocation list (CRL) in digital certificate management.
Correct Answer: D
Correct Answer: B
Correct Answer: B
Correct Answer: B
Correct Answer: A
Correct Answer: B
Q144. In CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance), how are collisions
avoided?
Correct Answer: B
Q145. What does TDMA stand for in the context of channelization protocols?
Correct Answer: B
Q146. What is the primary goal of the reservation protocol in controlled access?
• Minimize latency
• Maximize throughput
• Ensure fairness
• Reduce collision probability
Correct Answer: A
Correct Answer: C
Q148. What is a potential drawback of polling-based protocols in large networks with many devices?
Correct Answer: B
Q149. What is a significant advantage of token passing protocols in controlled access networks?
Correct Answer: B
Q150. In the Stop and Wait protocol, what is the role of the sender after sending a data frame?
Correct Answer: B
Q151. What is the major drawback of the Stop and Wait protocol in terms of efficiency?
• High throughput
• Low latency
• Inefficient use of bandwidth
• Minimal overhead
Correct Answer: C
Q152. In the context of the Stop and Wait protocol, what is the significance of using timers?
Correct Answer: D
Q153. Which factor makes the Stop and Wait protocol less suitable for high-speed networks and
long-distance communication?
• Reliability
• Simplicity
• Low overhead
• Efficiency
Correct Answer: D
Q154. Which data link layer protocol is known for its simplicity and involves the sender waiting for an
acknowledgment before sending the next frame?
• Go-Back-N
• Selective Repeat
• Stop and Wait
• Automatic Repeat Request (ARQ)
Correct Answer: C
Q155. Which data link layer protocol uses a sliding window approach, allowing the sender to
transmit multiple frames before waiting for acknowledgments?
• Go-Back-N
• Selective Repeat
• Stop and Wait
• Automatic Repeat Request (ARQ)
Correct Answer: A
Q156. Which ARQ protocol provides more efficient error recovery by retransmitting only the frames
with errors, rather than the entire window?
• Go-Back-N
• Selective Repeat
• Stop and Wait
• Automatic Repeat Request (ARQ)
Correct Answer: B
Q157. In the Selective Repeat ARQ protocol, what is the key advantage over Go-Back-N in terms of
efficiency and retransmissions?
Correct Answer: A
Q158. What is the primary disadvantage of Selective Repeat ARQ compared to Go-Back-N in terms of
complexity and implementation?
Correct Answer: A
Q159. Which of the following best describes an IP packet in the context of the Network Layer?
• A logical group of data bytes
• A physical network cable
• A data frame within a switch
• A wireless access point
Correct Answer: A
• 8 bits
• 16 bits
• 32 bits
• 64 bits
Correct Answer: C
Correct Answer: A
Q162. What is the maximum number of IPv4 addresses that can exist within a single subnet?
• 255
• 256
• 2^32 - 1
• 2^32 - 2
Correct Answer: C
Q163. Which routing algorithm updates routing tables based on the number of hops to a destination
and shares this information with neighboring routers?
Correct Answer: A
Correct Answer: B
Q165. What is the key advantage of Link State Routing (LSR) over Distance Vector Routing (DVR)?
Correct Answer: D
Q166. ICMP (Internet Control Message Protocol) is primarily used for what purpose in IP networks?
Correct Answer: B
Q167. What is the purpose of IPv6 (Internet Protocol version 6) in comparison to IPv4?
Correct Answer: C
Q168. What is the maximum number of unique IP addresses that can be represented by IPv6?
Correct Answer: D
Q169. In IPv6, what type of address is used to identify a group of devices that may belong to
different networks?
• Unicast address
• Anycast address
• Multicast address
• Broadcast address
Correct Answer: C
Q170. What is the primary reason for the transition from IPv4 to IPv6 in modern networking?
Correct Answer: D
Q171. In a Class C network, how many bits are assigned to the host portion of the IP address?
• 8 bits
• 16 bits
• 24 bits
• 32 bits
Correct Answer: C
Q172. What is the maximum number of host addresses that can be assigned in a Class C network
with a subnet mask of 255.255.255.224?
• 8
• 16
• 32
• 64
Correct Answer: C
Correct Answer: B
Q174. What is the term for borrowing bits from the host portion of an IP address to create subnets?
• Subnet borrowing
• Network slicing
• Bit masking
• Subnetting
Correct Answer: D
Correct Answer: B
Q176. In a network topology where link costs represent delay, which routing algorithm is suitable for
minimizing latency?
Correct Answer: C
Q177. Which routing protocol typically uses the Bellman-Ford algorithm for path selection?
Correct Answer: B
Q178. In dynamic routing, what does the term "metric" refer to?
Correct Answer: C
Q179. Which type of routing algorithm adjusts routes based on real-time network conditions?
• Dynamic routing algorithms
• Static routing algorithms
• Shortest Path Routing algorithms
• Link-State routing algorithms
Correct Answer: A
Q180. What does RIP stand for in the context of routing protocols?
Correct Answer: A
Q181. What is the maximum hop count allowed in RIP v1 for a valid route?
• 10 hops
• 15 hops
• 16 hops
• 100 hops
Correct Answer: C
Q182. Which metric does RIP use to measure the distance to a destination network?
• Hop count
• Bandwidth
• Delay
• Reliability
Correct Answer: A
Correct Answer: A
Q184. What does OSPF stand for in the context of routing protocols?
Correct Answer: D
Q185. OSPF uses a link-state routing algorithm. What type of information is stored in OSPF's link-
state database?
Correct Answer: C
Q186. What is the purpose of OSPF's Designated Router (DR) and Backup Designated Router (BDR) in
a multi-access network?
Correct Answer: B
Q187. What OSPF packet type is used by routers to discover neighbors and establish adjacencies?
Correct Answer: B
Correct Answer: C
Q189. What does EIGRP stand for in the context of routing protocols?
• Enhanced Internet Gateway Routing Protocol
• Enhanced Interior Gateway Routing Protocol
• Efficient Internet Gateway Routing Protocol
• Enhanced Interior Gateway Routing Process
Correct Answer: B
Correct Answer: B
Q191. EIGRP uses a composite metric to calculate the best path to a destination. What is this metric
called?
• Cost metric
• Bandwidth-delay product
• EIGRP metric
• Successor metric
Correct Answer: C
• 90
• 100
• 110
• 120
Correct Answer: A
Q193. What is the primary reason for using EIGRP in a Cisco network environment?
Correct Answer: C
Q194. What does BGP stand for in the context of routing protocols?
• Border Gateway Protocol
• Best Gateway Protocol
• Border Gateway Process
• Basic Gateway Protocol
Correct Answer: A
Q195. BGP is classified into two main categories based on its role in routing. What are these
categories?
Correct Answer: A
• 90
• 100
• 110
• 120
Correct Answer: B
Q197. In the Transport Layer, what service ensures that data units are delivered error-free and in the
correct order?
Correct Answer: C
• Data encryption
• Breaking large messages into smaller segments
• Error detection and correction
• End-to-end communication
Correct Answer: B
Q199. What type of communication does the Transport Layer provide: connectionless or connection-
oriented?
• Connectionless
• Connection-oriented
• Both connectionless and connection-oriented
• Neither connectionless nor connection-oriented
Correct Answer: C
Q200. Which Transport Layer service allows the receiver to detect and correct errors in the data?
• Flow control
• Error detection and correction
• Multiplexing
• Segmentation and reassembly
Correct Answer: B
Q201. Which Transport Layer service provides a means of multiplexing, demultiplexing, and
identifying different data streams?
• Flow control
• Multiplexing
• Error detection and correction
• Segmentation and reassembly
Correct Answer: B
Q202. In a connectionless protocol like UDP, are acknowledgments sent to confirm successful data
transmission?
• Yes
• No
• It depends on the application
• Acknowledgments are optional
Correct Answer: B
Q203. Which type of protocol provides reliable, error-checked, and ordered data delivery:
connectionless or connection-oriented?
• Connectionless
• Connection-oriented
• Both connectionless and connection-oriented
• Neither connectionless nor connection-oriented
Correct Answer: B
Q204. Which type of protocol is more suitable for applications that require low-latency
communication?
• Connectionless
• Connection-oriented
• Both connectionless and connection-oriented
• Neither connectionless nor connection-oriented
Correct Answer: A
Q205. Which type of protocol is less complex in terms of overhead and resource usage:
connectionless or connection-oriented?
• Connectionless
• Connection-oriented
• Both connectionless and connection-oriented
• Neither connectionless nor connection-oriented
Correct Answer: A
Q206. In a connection-oriented protocol like TCP, how are data segments organized and identified for
proper sequencing at the receiver?
Correct Answer: A
Q207. Which Transport Layer protocol provides a connectionless, unreliable, and low-overhead data
transfer service?
• TCP
• SMTP
• UDP
• HTTP
Correct Answer: C
Q208. In the Transport Layer, which protocol is responsible for reliable, error-checked data delivery
with flow control?
• UDP
• ICMP
• HTTP
• TCP
Correct Answer: D
Q209. What is the primary difference between TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol)?
• TCP provides reliable, ordered data delivery, while UDP offers connectionless, unreliable
delivery.
• TCP is faster than UDP.
• UDP provides encryption, while TCP does not.
• TCP is used for video streaming, while UDP is used for web browsing.
Correct Answer: A
Q210. In a Transport Layer protocol like TCP, how is data sequencing achieved to ensure that packets
are delivered in the correct order?
Correct Answer: A
Q211. Which Transport Layer protocol is associated with the World Wide Web and is used for
fetching web pages and data?
• FTP
• SMTP
• HTTP
• SNMP
Correct Answer: C
Q212. What is the purpose of the TCP three-way handshake during the establishment of a
connection?
Correct Answer: A
Q213. During the TCP three-way handshake, what happens after the client sends a SYN (Synchronize)
segment to the server?
Correct Answer: A
Q214. What is the primary advantage of TCP's reliable data delivery mechanism over UDP's
connectionless approach?
Correct Answer: C
Q215. Which TCP flag is used to indicate the end of data transmission and to initiate connection
termination?
• ACK (Acknowledgment)
• SYN (Synchronize)
• RST (Reset)
• FIN (Finish)
Correct Answer: D
Correct Answer: A
Q217. During the TCP three-way handshake, which side initiates the process by sending a SYN
(Synchronize) segment?
• The server
• The client
• Both the server and client
• Neither the server nor client
Correct Answer: B
Q218. What is the purpose of the SYN-ACK (Synchronize-Acknowledgment) segment sent by the
receiving device in the TCP three-way handshake?
Correct Answer: A
Q219. What is the final step in the TCP three-way handshake process after both sides have
exchanged SYN and ACK segments?
Correct Answer: A
Q220. In the UDP message format, what is the purpose of the source port number field?
Correct Answer: B
Q221. In TCP, what is the purpose of the Sequence Number field in the message header?
Correct Answer: C
Q222. In the TCP message format, what is the role of the Acknowledgment (ACK) flag?
Correct Answer: A
Q223. Which field in the UDP message format is used to perform error checking on the message
header and data?
• Source port
• Destination port
• Checksum
• Length
Correct Answer: C
Q224. What is the primary goal of congestion control mechanisms in computer networks?
Correct Answer: B
Q225. Which QoS technique allows network administrators to assign higher or lower priorities to
different types of traffic?
• Traffic shaping
• Packet switching
• Quality of Service (QoS)
• Error correction
Correct Answer: C
Q226. What is the primary metric used to measure the quality of voice and video communication in
QoS evaluations?
Correct Answer: D
Q227. What is a common technique for mitigating network congestion by temporarily holding
packets before transmission?
• Quality of Service (QoS)
• Traffic shaping
• Congestion control
• Jitter control
Correct Answer: B
Q228. Which DNS record type is used to associate an IP address with a domain name?
• MX (Mail Exchanger)
• PTR (Pointer)
• A (Address)
• CNAME (Canonical Name)
Correct Answer: C
Correct Answer: C
Correct Answer: B
Q231. What does the term "DNS propagation" refer to in DNS management?
Correct Answer: B
Q232. How does remote logging contribute to security incident detection and response?
Correct Answer: B
Correct Answer: B
Correct Answer: B
Correct Answer: B
Q236. What is spam email, and how do email providers combat spam?
Correct Answer: A
Q237. What is FTP (File Transfer Protocol), and what is its primary purpose?
Correct Answer: B
Q238. What role do passive and active modes play in FTP connections?
Correct Answer: B
Correct Answer: A
Q240. What is the World Wide Web (WWW), and how does it function in modern communication?
Correct Answer: B
Q241. How are web addresses (URLs) structured, and what do they represent?
Correct Answer: C
Q242. What is the significance of HTTP (Hypertext Transfer Protocol) in web communication?
Correct Answer: B
Q243. What is a URL (Uniform Resource Locator), and how does it relate to HTTP?
Correct Answer: C
Q244. How does caching work in HTTP, and what benefits does it offer in web browsing?
Correct Answer: B
Q245. What is SMTP (Simple Mail Transfer Protocol), and what is its primary purpose?
Correct Answer: A
Q246. What are SMTP servers (MTAs), and how do they handle email routing and delivery?
Correct Answer: C
Q247. What are the SMTP port numbers (e.g., 25, 587), and how are they used in email
transmission?
Correct Answer: C
Q248. How does SNMP enable the monitoring and management of network devices and resources?
Correct Answer: C
Q249. Explain the roles of SNMP traps and informs in network management and alerting.
Correct Answer: B
Q250. How does SNMP version 3 enhance security and authentication in network management
compared to earlier versions?
Correct Answer: A
Q251. How does SNMP contribute to proactive network management and troubleshooting?
Correct Answer: B
Q252. What role do firewalls play in network security, and how do they filter network traffic?
Correct Answer: C
Q253. Explain the concept of incident response in network security and its importance in mitigating
security breaches.
Correct Answer: C
Correct Answer: B
Q255. Explain the difference between symmetric and asymmetric encryption, and when is each used
in network security?
Correct Answer: C
Q256. What is a cryptographic hash function, and how is it used in data integrity verification and
password storage?
Correct Answer: C
Q257. What are some common challenges in implementing cryptography in network security, and
how can they be mitigated?
• Lack of encryption algorithms
• Key management issues
• Slow network performance
• Lack of user authentication
Correct Answer: B
Q258. Explain the concept of a digital signature algorithm and how it works.
Correct Answer: B
Q259. How does the recipient of a digitally signed message verify the signature's authenticity and
integrity?
Correct Answer: B
Q260. What challenges can arise in implementing digital signatures, and how can they be mitigated
for secure data transmission?
Correct Answer: A
Correct Answer: c
Q262. What is the primary purpose of the Stop and Wait protocol in data link layer communication?
• Minimize latency
• Maximize throughput
• Ensure error detection
• Achieve reliable data transfer
Correct Answer: D
Q263. What does the receiver do upon successfully receiving a data frame in the Stop and Wait
protocol?
Correct Answer: C
Q264. In the Stop and Wait protocol, what happens if the sender does not receive an
acknowledgment (ACK) within a certain time frame?
Correct Answer: D
Q265. In the Stop and Wait protocol, what is the purpose of sequence numbers attached to data
frames?
Correct Answer: C
Q266. What is the Stop and Wait protocol's impact on the effective data transmission rate compared
to the overall channel capacity?
Q267. What is the main advantage of the Stop and Wait protocol in noiseless channels?
• Minimal latency
• High throughput
• Simple implementation
• Support for parallel transmission
Correct Answer: C
Q268. In a noisy channel, what is the primary challenge that data link layer protocols like ARQ aim to
address?
• Minimizing latency
• Ensuring error-free data transmission
• Maximizing throughput
• Reducing the number of frames transmitted
Correct Answer: B
Q269. What action does the sender take in the Stop and Wait protocol upon receiving a negative
acknowledgment (NAK) from the receiver?
Correct Answer: A
Q270. In Go-Back-N ARQ, if the receiver detects an error in a frame, what action is taken regarding
subsequent frames in the window?
Correct Answer: A
Q271. What happens if a frame is lost or corrupted in the Go-Back-N protocol, and the receiver
acknowledges subsequent frames?
Correct Answer: A
Q272. What characteristic of Selective Repeat ARQ allows it to recover from errors in any frame
within the window without affecting the rest?
Correct Answer: A
Q273. What is the primary function of the Network Layer in the OSI model?
Correct Answer: B
Correct Answer: A
Correct Answer: B
Correct Answer: B
Correct Answer: B
Correct Answer: A
Q279. Which field in the IPv4 header is used to indicate the time-to-live (TTL) of a packet?
• Protocol
• Destination IP Address
• Source IP Address
• Time-to-Live (TTL)
Correct Answer: D
Q280. In Distance Vector Routing (DVR), what is the primary drawback known as the "count-to-
infinity" problem?
• Slow convergence
• Routing loops
• Limited scalability
• Inefficient bandwidth utilization
Correct Answer: B
Q281. Which routing algorithm employs a "link state advertisement" (LSA) flooding mechanism to
share routing information with all routers in a network?
Correct Answer: B
Q282. In Link State Routing (LSR), what information is included in the link state advertisement (LSA)
packets?
Correct Answer: B
Q283. In the context of routing algorithms, what is the purpose of a routing table?
Correct Answer: A
Q284. Which routing algorithm is commonly used in interior routing within autonomous systems and
relies on routers broadcasting routing tables to neighbors?
Correct Answer: A
Q285. What is the main function of IGMP (Internet Group Management Protocol) in network
communications?
Correct Answer: B
Q286. Which of the following is a key advantage of IPv6 over IPv4?
Correct Answer: B
Q287. How does IPv6 address the limitation of IPv4's address exhaustion issue?
Correct Answer: A
Q288. Which transition mechanism facilitates the coexistence of IPv4 and IPv6 in a network by
encapsulating IPv6 packets within IPv4 packets?
• Dual-stack
• Tunneling
• IPv6 over IPv4 (6over4)
• Network Address Translation (NAT)
Correct Answer: B
Q289. Which of the following IPv6 address formats represents a loopback address used for testing on
the local device?
• 2001:db8::/32
• ::1/128
• ff00::/8
• fe80::/10
Correct Answer: B
Q290. How many bits are reserved for the network portion in a Class A IP address?
• 8 bits
• 16 bits
• 24 bits
• 32 bits
Correct Answer: A
Q291. What does subnetting allow network administrators to do?
Correct Answer: B
Correct Answer: B
• /24
• /26
• /28
• /30
Correct Answer: C
Q294. Which routing algorithm is commonly used for finding the shortest path in a network?
Correct Answer: A
Q295. What is the primary advantage of dynamic routing algorithms over static routing?
Correct Answer: A
Q296. Which routing algorithm calculates the shortest path based on the cumulative link costs?
Correct Answer: A
Q297. Which dynamic routing protocol uses a distance-vector algorithm and broadcasts routing
updates?
Correct Answer: B
Q298. What is the primary disadvantage of static routing in a large and complex network?
Correct Answer: C
Q299. Which version of RIP sends routing updates using broadcast messages?
• RIP v1
• RIP v2
• Both RIP v1 and v2
• Neither RIP v1 nor v2
Correct Answer: A
Q300. In RIP v2, what is the primary enhancement over RIP v1?
Correct Answer: A
Q301. What action does a RIP router take if it receives a route update with a higher metric than its
own?
Correct Answer: B
• 90
• 100
• 110
• 120
Correct Answer: C
Correct Answer: C
Q304. Which OSPF area type connects to the backbone area (Area 0)?
• Stub area
• Backbone area
• Transit area
• Virtual link area
Correct Answer: C
Q305. Which OSPF area is typically used to connect multiple OSPF areas together?
• Backbone area
• Transit area
• Stub area
• Virtual link area
Correct Answer: A
Q306. OSPF uses a cost metric to determine the best path to a destination. What does this metric
represent?
• Bandwidth
• Delay
• Hop count
• Reliability
Correct Answer: A
• 90
• 100
• 110
• 120
Correct Answer: A
Q308. EIGRP is a Cisco-proprietary routing protocol. What feature of EIGRP allows it to converge
quickly after topology changes?
Correct Answer: A
Q309. What is the primary advantage of EIGRP over distance-vector routing protocols like RIP?
• Fast convergence
• Simplicity
• Compatibility with other routing protocols
• Support for large-scale networks
Correct Answer: A
Q310. In EIGRP, what type of packets are used to establish and maintain neighbor adjacencies?
• Update packets
• Hello packets
• Query packets
• Acknowledgment packets
Correct Answer: B
Q311. EIGRP supports both IPv4 and IPv6. Which protocol does EIGRP use for IPv4 routing?
• EIGRPv4
• EIGRP-NG (Next Generation)
• EIGRPv6
• EIGRP-IPv4
Correct Answer: A
Q312. What is the maximum hop count allowed in EIGRP for a valid route?
• 10 hops
• 15 hops
• 16 hops
• 100 hops
Correct Answer: B
Q313. In BGP, what is the primary function of the Autonomous System (AS) number?
Correct Answer: C
Q314. What is the primary difference between iBGP and eBGP in BGP routing?
• iBGP is used within an AS, and eBGP is used between different ASes
• iBGP uses a simpler metric than eBGP
• eBGP is used for internal routing, while iBGP is used for external routing
• iBGP uses a different protocol stack than eBGP
Correct Answer: A
Correct Answer: A
Q316. In BGP, what is a prefix or network prefix?
Correct Answer: D
Q317. BGP is commonly used at the edge of the Internet to exchange routing information between
ISPs. What is this type of BGP deployment called?
• Core BGP
• Border BGP
• Edge BGP
• Intermediate BGP
Correct Answer: B
Q318. Which BGP message type is used to establish and maintain BGP neighbor relationships?
• OPEN message
• UPDATE message
• KEEPALIVE message
• NOTIFICATION message
Correct Answer: A
Q319. What is the primary benefit of BGP's path vector routing algorithm over distance-vector or
link-state algorithms?
• Loop prevention
• Faster convergence
• Support for classless routing
• Simplicity
Correct Answer: A
Q320. Which Transport Layer service allows multiple applications on the same device to share the
network connection simultaneously?
• Segmentation
• Error correction
• Multiplexing
• Flow control
Correct Answer: C
Q321. Which Transport Layer service is responsible for controlling the rate of data exchange between
sender and receiver to prevent congestion?
• Segmentation
• Multiplexing
• Flow control
• Error correction
Correct Answer: C
Correct Answer: A
Q323. When using the Transport Layer, what is the purpose of error detection and correction?
Correct Answer: C
Q324. In a TCP connection, what role does the ACK (Acknowledgment) flag play during normal data
transmission?
Correct Answer: A
Q325. During the TCP three-way handshake, if the SYN-ACK segment sent by the server is lost or not
received by the client, what happens?
Q326. What is the purpose of Quality of Service (QoS) mechanisms in network communication?
Correct Answer: B
Q327. What is the purpose of admission control in Quality of Service (QoS) management?
Correct Answer: D
Q328. How does DNS contribute to load balancing for websites with multiple servers?
Correct Answer: B
Correct Answer: B
Correct Answer: B
Q331. What are some common challenges associated with remote logging in distributed
environments?
Correct Answer: B
Q332. What is log rotation in the context of remote logging, and why is it important?
Correct Answer: B
Q333. What is the syslog protocol, and how is it used for remote logging?
Correct Answer: B
Correct Answer: B
Correct Answer: B
Q336. How can remote logging be used to monitor user activity and access control?
Correct Answer: B
Q337. Describe the role of log compression in optimizing remote log storage.
Correct Answer: B
Q338. What is electronic mail (email), and how does it function in modern communication?
Correct Answer: B
Q339. How does passive FTP differ from active FTP in terms of data transfer?
Correct Answer: C
Correct Answer: B
Q341. What is anonymous FTP, and why is it used?
Correct Answer: C
Q342. How do FTP clients and FTP servers interact in a typical FTP session?
Correct Answer: B
Q343. Who is credited with inventing the World Wide Web, and when was it first introduced?
Correct Answer: B
Correct Answer: B
Correct Answer: B
Q346. What is the role of CSS (Cascading Style Sheets) in web design?
• To secure email attachments
• To define the layout and appearance of web pages
• To optimize email delivery
• To encrypt email data
Correct Answer: B
Correct Answer: C
Q348. What role does HTTP play in web browsing and accessing web pages?
Correct Answer: C
Q349. How does HTTP handle hyperlinks and navigation between web pages?
Correct Answer: C
Q350. Explain the concept of HTTP methods (GET, POST, PUT, DELETE, et) and their purposes.
Correct Answer: B
Q351. What is the significance of HTTP status codes (e.g., 200, 404, 500) in web communication?
Correct Answer: C
Q352. How does HTTPS (HTTP Secure) enhance web security compared to HTTP?
Correct Answer: A
Q353. What is SMTP authentication, and why is it important for email security?
Correct Answer: B
Q354. What is the purpose of SMTP relaying, and how does it work in email routing?
Correct Answer: B
Q355. How does SMTP handle email attachments, and what formats are commonly used for email
attachments?
Correct Answer: C
Q356. What are some common security challenges and solutions in SMTP email communication?
Correct Answer: B
Q357. What is SNMP (Simple Network Management Protocol), and what is its primary purpose?
Correct Answer: B
Q358. What are some common use cases for SNMP in network management, and how does it
benefit IT professionals?
Correct Answer: B
Correct Answer: A
Q360. Which network security service is responsible for verifying the identity of users and devices?
• Data integrity
• Authentication
• Data encryption
• Intrusion detection systems (IDS)
Correct Answer: B
Q361. How does access control contribute to network security, and what types of access control are
commonly used?
• It optimizes network routing
• It restricts unauthorized access
• It encrypts network traffic
• It compresses network logs
Correct Answer: B
Q362. What is the role of intrusion detection and prevention systems (IDS/IPS) in network security?
Correct Answer: C
Q363. How does network monitoring enhance security services, and what are some common tools
used for monitoring?
Correct Answer: B
Q364. What is the significance of security policy enforcement in network security, and how is it
implemented?
Correct Answer: D
Q365. How do cryptographic keys enhance the security of encrypted data, and what key
management practices are important?
Correct Answer: B
Q366. What is the concept of a digital certificate, and how does it relate to public key infrastructure
(PKI) in network security?
Correct Answer: A
Q367. What is the purpose of secure sockets layer (SSL) and transport layer security (TLS) protocols
in network encryption?
Correct Answer: A
Q368. What is the significance of a digital certificate in the context of digital signatures?
Correct Answer: B
Q369. What is the difference between a digital signature and a digital certificate in network security?
Correct Answer: A
Correct Answer: C
Q371. What is the purpose of the Certificate Authority (CA) in digital signature validation, and how
does it work?
Correct Answer: C
Q372. In the TCP header, what field is used to specify the maximum segment size that a sender can
handle?
• Acknowledgment Number
• Sequence Number
• Window Size
• Maximum Segment Size (MSS)
Correct Answer: D
Q373. Which field in the UDP header is optional and used for error checking when set to a non-zero
value?
• Source Port
• Checksum
• Destination Port
• Length
Correct Answer: B
Q374. What is the purpose of the Urgent Pointer field in the TCP header?
Correct Answer: C
Q375. Which field in the TCP header is used to acknowledge the receipt of data and indicate the next
expected sequence number?
• Sequence Number
• Acknowledgment Number
• Window Size
• Urgent Pointer
Correct Answer: B
Q376. In the UDP header, what is the purpose of the Length field?
Correct Answer: C
Correct Answer: C
Q378. Which QoS technique allows network administrators to assign different priority levels to
different types of network traffic?
• Traffic Shaping
• Traffic Policing
• Traffic Classification
• Traffic Engineering
Correct Answer: C
Q379. Which congestion control mechanism in TCP reduces the sender's transmission rate when
congestion is detected?
• Slow Start
• Congestion Avoidance
• Fast Retransmit
• Selective Acknowledgment
Correct Answer: B
Correct Answer: C
Q381. Which QoS parameter measures the variation in packet arrival times in a network?
• Latency
• Throughput
• Jitter
• Bandwidth
Correct Answer: C
Q382. Which Application Layer protocol is primarily responsible for translating human-readable
domain names into IP addresses?
• HTTP
• DNS
• SMTP
• POP3
Correct Answer: B
Q383. What is the primary purpose of the FTP (File Transfer Protocol) in the Application Layer?
Correct Answer: A
Q384. Which protocol is used for retrieving email messages from a mail server to a client device,
allowing users to read their emails?
• SMTP
• HTTP
• POP3
• DNS
Correct Answer: C
Q385. Which Application Layer protocol is responsible for the delivery of web pages from web
servers to web browsers?
• SMTP
• FTP
• HTTP
• Telnet
Correct Answer: C
Q386. What is the primary purpose of the IMAP (Internet Message Access Protocol) in the
Application Layer?
Correct Answer: B
Q387. Which Application Layer protocol is commonly used for remote login and terminal emulation
on remote systems?
• SMTP
• Telnet
• FTP
• POP3
Correct Answer: B
Q388. What does the SNMP (Simple Network Management Protocol) in the Application Layer
primarily enable?
Correct Answer: C
Q389. Which Application Layer protocol is used for the exchange of email messages between mail
servers?
• SMTP
• HTTP
• SIP
• SNMP
Correct Answer: A
Q390. What is the primary function of the SSH (Secure Shell) protocol in the Application Layer?
Correct Answer: C
Q391. Which Application Layer protocol is used for the retrieval and management of directory
information in a network?
Correct Answer: A
Q392. Which security service ensures that data is not altered during transmission and can be relied
upon as genuine?
• Authentication
• Integrity
• Confidentiality
• Availability
Correct Answer: B
Q393. Which cryptographic key is used for encrypting data in symmetric-key cryptography?
• Public Key
• Private Key
• Session Key
• Digital Signature
Correct Answer: C
Q394. Which cryptographic technique involves the use of a pair of keys, one for encryption and one
for decryption, and is commonly used in asymmetric encryption?
• Hashing
• Digital Signatures
• Public Key Cryptography
• Symmetric Key Cryptography
Correct Answer: C
Q395. What security service ensures that only authorized users or systems have access to data and
network resources?
• Confidentiality
• Data Integrity
• Authentication
• Non-repudiation
Correct Answer: C
• 16 bytes
• 20 bytes
• 24 bytes
• 28 bytes
Correct Answer: B
Q397. Which field in the TCP header is used for flow control and specifies the number of bytes the
sender can transmit before receiving an acknowledgment?
• Acknowledgment Number
• Sequence Number
• Window Size
• Urgent Pointer
Correct Answer: C
Q398. In the UDP header, what is the purpose of the Checksum field?
Correct Answer: B
Q399. Which field in the TCP header is used to ensure the integrity of the header and data?
• Source Port
• Checksum
• Acknowledgment Number
• Urgent Pointer
Correct Answer: B
Q400. What is the purpose of the Sequence Number field in the TCP header?
Correct Answer: D
Correct Answer: C
Q402. Which congestion control algorithm is commonly used in TCP to detect and respond to
network congestion?
• Leaky Bucket
• Token Bucket
• Slow Start
• Quality of Service (QoS)
Correct Answer: C
Correct Answer: C
Q404. In QoS, what does the term "Traffic Shaping" refer to?
Correct Answer: C
Q405. Which of the following is NOT a commonly used QoS parameter for traffic classification and
prioritization?
• Delay
• Packet Size
• Throughput
• Jitter
Correct Answer: B
Q406. Which layer of the OSI model is responsible for providing network services directly to end-
users or applications?
• Physical Layer
• Data Link Layer
• Transport Layer
• Application LAyer
Correct Answer: D
Q407. What is the primary function of the Application Layer in the OSI model?
Correct Answer: C
Q408. Which protocol is commonly used for sending and receiving email messages over the
Internet?
• SMTP
• HTTP
• FTP
• DNS
Correct Answer: A
• File transfer
• Email communication
• Web page retrieval
• Remote login
Correct Answer: C
Q410. Which protocol is used for secure data transmission over the web, ensuring confidentiality and
data integrity?
• HTTP
• FTP
• SMTP
• HTTPS
Correct Answer: D
Q411. Which Application Layer protocol is used for transferring files between a client and a server
over a network?
• SMTP
• Telnet
• FTP
• POP3
Correct Answer: C
Q412. Which Application Layer protocol is commonly used for remote login and command execution
on remote servers?
• HTTP
• Telnet
• SMTP
• FTP
Correct Answer: B
Q413. What is the primary purpose of the DNS (Domain Name System) protocol in the Application
Layer?
Correct Answer: B
Q414. Which Application Layer protocol is responsible for the retrieval of email messages from a mail
server to a client device?
• FTP
• HTTP
• POP3
• IMAP
Correct Answer: C
Q415. Which Application Layer protocol is used for real-time communication, including voice and
video calls, over the Internet?
• SMTP
• HTTP
• SIP
• SNMP
Correct Answer: C
Q416. Which network security service ensures that data is not disclosed to unauthorized users?
• Authentication
• Integrity
• Confidentiality
• Availability
Correct Answer: C
Correct Answer: B
Q418. Which cryptographic key is used for both encryption and decryption in symmetric-key
cryptography?
• Public Key
• Private Key
• Session Key
• Digital Signature
Correct Answer: C
Q419. What is a digital signature primarily used for in network security?
Correct Answer: B
Q420. Which cryptographic technique involves the use of two keys, one for encryption and one for
decryption, and is commonly used in asymmetric encryption?
• Hashing
• Digital Signatures
• Public Key Cryptography
• Symmetric Key Cryptography
Correct Answer: C
Q421. Which field in the IP header is used for ensuring the integrity of the packet during
transmission?
Correct Answer: C
Correct Answer: A
Q424. In HTTP, what is the purpose of the "Referer" header field in an HTTP request?
Correct Answer: C
Q425. In SMTP, what role does the "MX record" play in the email delivery process?
Correct Answer: C
Q426. In SNMP, what does the term "OID" (Object Identifier) refer to?
Correct Answer: B
Q427. In the context of network security, what does the term "access control" refer to?
Correct Answer: B
Q428. In the context of network security, what is the primary purpose of an Intrusion Prevention
System (IPS)?
Q429. What does Quality of Service (QoS) in computer networks refer to?
Correct Answer: C
Correct Answer: D
Q431. What is the primary benefit of centralizing log management through remote logging?
Correct Answer: B
Correct Answer: B
Correct Answer: C
Q434. What is the primary purpose of S/MIME (Secure/Multipurpose Internet Mail Extensions) in
email communication?
Correct Answer: B
Correct Answer: C
Q436. What is the purpose of a web browser's "cookie" in the context of the World Wide Web?
Correct Answer: C
Q437. What is the purpose of the "Cache-Control" header field in HTTP responses?
Correct Answer: B
Correct Answer: D
Q439. What is the purpose of the HTML (Hypertext Markup Language) in the World Wide Web?
Correct Answer: B
Correct Answer: B
Q441. Which cryptographic protocol is commonly used for securing web traffic by encrypting data
between a web browser and a web server?
Correct Answer: B
Q442. Which email authentication mechanism helps prevent email spoofing and phishing by
verifying the sender's domain in the email headers?
Correct Answer: B
Q443. Which protocol is commonly used for remote logging in Unix and Linux systems?
Q444. Which QoS approach involves reserving network resources in advance to guarantee a certain
level of service for specific traffic flows?
Correct Answer: A
Q445. Which type of attack in cryptography involves attempting every possible key until the correct
one is found?
• Brute-force attack
• Man-in-the-middle attack
• Denial-of-Service (DoS) attack
• Phishing attack
Correct Answer: A
• TCP
• UDP
• ICMP
• ARP
Correct Answer: A
Q447. Which of the following fields is present in the TCP header but not in the UDP header?
• Sequence number
• Acknowledgement number
• Both sequence number and acknowledgement number
• None of the above
Correct Answer: C
Q448. What are the two main types of congestion control algorithms?
• Open-loop
• Closed-loop
• Both open-loop and closed-loop
• None of the above
Correct Answer: C
Correct Answer: D
Correct Answer: A
Correct Answer: D
Q452. What is the Simple Mail Transfer Protocol (SMTP) used for?
Correct Answer: C
Q454. What is the Internet Mail Access Protocol (IMAP) used for?
Correct Answer: A
• SSH
• Telnet
• Both SSH and Telnet
• None of the above
Correct Answer: C
Correct Answer: A
Correct Answer: A
• FTP is used to transfer files between computers, while the WWW is used to browse the
we
• FTP is a file transfer protocol, while the WWW is a hypertext transfer protocol.
• FTP uses TCP, while the WWW uses HTTP.
• All of the above
Correct Answer: D
• SMTP
• HTTP
• SNMP
• None of the above
Correct Answer: A
• SNMP
• HTTP
• SMTP
• None of the above
Correct Answer: A
• To protect networks and their data from unauthorized access, use, disclosure, disruption,
modification, or destruction.
• To improve the performance of networks.
• To reduce the cost of network operations.
• All of the above.
Correct Answer: D
Correct Answer: A
• Symmetric-key cryptography uses the same key to encrypt and decrypt data, while
asymmetric-key cryptography uses two different keys: a public key and a private key.
• Public key cryptography is more secure than symmetric-key cryptography.
• Symmetric-key cryptography is faster than asymmetric-key cryptography.
• All of the above.
Correct Answer: D
Correct Answer: A
• Digital signatures can help to protect against data tampering, forgery, and
impersonation.
• Digital signatures can help to improve the efficiency of electronic transactions.
• Digital signatures can help to reduce the cost of doing business electronically.
• All of the above.
Correct Answer: D
Correct Answer: A
Q468. Which protocol is an example of a connection-oriented protocol used for secure data
transmission over the internet?
Correct Answer: D
Q469. What is the primary benefit of a connectionless protocol's approach to data transmission?
Correct Answer: B
Q470. In a connectionless protocol, how are data packets delivered to the destination?
Correct Answer: D
Q471. In the TCP header, which field indicates the length of the TCP header and any optional data
that follows it?
• Sequence Number
• Acknowledgment Number
• Header Length
• Window Size
Correct Answer: C
Q472. What does the term "Sequence Number" refer to in the context of TCP communication?
Correct Answer: A
Q473. In the TCP/UDP message format, what is the purpose of the "Source Port" field?
Correct Answer: B
Q474. Which network security protocol provides secure communication over the web by encrypting
data between a web browser and a web server?
Correct Answer: B
Q475. Which cryptographic technique is used to verify the integrity and authenticity of a message by
generating a fixed-length hash?
• Digital signature
• Symmetric encryption
• Asymmetric encryption
• Hashing
Correct Answer: D
Correct Answer: C
• Private key
• Secret key
• Public key
• Symmetric key
Correct Answer: C
Q478. Which security service ensures that data is not disclosed to unauthorized users?
• Authentication
• Data Integrity
• Confidentiality
• Availability
Correct Answer: C
Q479. Which FTP mode allows for data to flow in both directions but not simultaneously, with the
client initiating the data connection?
• Active mode
• Passive mode
• Extended Passive mode
• Passive-active mode
Correct Answer: A
Correct Answer: B
Q481. Which HTTP method is idempotent, meaning that making multiple identical requests will
produce the same result as a single request?
• GET
• POST
• PUT
• DELETE
Correct Answer: A
Q482. Which HTTP status code indicates a successful request, and the server has fulfilled it?
• 200 OK
• 302 Found
• 404 Not Found
• 500 Internal Server Error
Correct Answer: A
Q483. In FTP, which mode is used for transferring files where data flows independently of control and
may be sent on separate connections?
• Active mode
• Passive mode
• Extended Passive mode
• Stream mode
Correct Answer: B
Correct Answer: C
Q485. In HTTP, which request method is typically used to make changes to the server's state or
create new resources?
• GET
• POST
• PUT
• HEAD
Correct Answer: C
Q486. Which of the following is NOT a primary security service provided by network security
protocols?
• Authentication
• Access Control
• Data Integrity
• Load Balancing
Correct Answer: D
Q487. Which cryptographic algorithm is widely used for securing email communications?
• RSA
• AES
• SHA-256
• HMAC
Correct Answer: A
Q488. Which DiffServ (Differentiated Services) field in an IP header is used to specify the priority
level of a packet?
Correct Answer: A
Correct Answer: B
Q490. In a network with QoS, what does the term "DSCP" stand for?
Correct Answer: C
Q491. Identify the field that is NOT present in the TCP header
• Sequence number
• Source port number
• Destination port number
• Time to live (TTL)
Correct Answer: D
• TCP
• UDP
• Both TCP and UDP
• Neither TCP nor UDP
Correct Answer: B
Q493. Identify the congestion control mechanism that is NOT used by TCP
• Slow start
• Congestion avoidance
• Fast recovery
• Forward error correction (FEC)
Correct Answer: D
Correct Answer: A
Q495. Identify the QoS parameter that is used to measure the delay of a packet
• Latency
• Jitter
• Packet loss rate
• Bandwidth
Correct Answer: A
• A record
• CNAME record
• MX record
• ARP record
Correct Answer: D
• Syslog
• SNMP
• Both Syslog and SNMP
• Neither Syslog nor SNMP
Correct Answer: A
Q498. Identify the component of an email message that is NOT mandatory
• Message header
• Message body
• Message envelope
• Message signature
Correct Answer: D
Q499. Identify the protocol that is used to transfer files over a network
• FTP
• HTTP
• Both FTP and HTTP
• Neither FTP nor HTTP
Correct Answer: A
• FTP
• HTTP
• Both FTP and HTTP
• Neither FTP nor HTTP
Correct Answer: B
Q501. Which of the following is NOT a benefit of using additive increase, multiplicative decrease
(AIMD) for congestion control?
Correct Answer: B
Q502. Which of the following QoS mechanisms can be used to guarantee bandwidth to a particular
flow?
• Token bucket
• Leaky bucket
• Weighted fair queuing
• All of the above
Correct Answer: D
Q503. Which of the following DNS records is used to map a domain name to an IP address?
• A record
• CNAME record
• MX record
• NS record
Correct Answer: A
Correct Answer: C
Q505. Which of the following routing algorithms is used to find the shortest path between two nodes
in a network?
• Dijkstra's algorithm
• Bellman-Ford algorithm
• Link state routing
• Distance vector routing
Correct Answer: A
• It is unreliable.
• It is connectionless.
• It is inefficient for large data transfers.
• It is complex to implement.
Correct Answer: D
Q507. Which of the following factors can affect the performance of TCP congestion control?
Correct Answer: D
Q508. Which of the following QoS mechanisms can be used to reduce jitter?
• Packet buffering
• Traffic shaping
• Priority queuing
• All of the above
Correct Answer: D
Q509. Which of the following DNS records is used to map a domain name to a mail server?
• A record
• CNAME record
• MX record
• NS record
Correct Answer: C
Q510. Which of the following security threats can be mitigated by using a firewall?
• Denial-of-service attacks
• Man-in-the-middle attacks
• Malware infections
• All of the above
Correct Answer: D
Correct Answer: D
Q512. Which of the following wireless networking standards is used for high-speed data transfers?
• 802.11a
• 802.11b
• 802.11g
• 802.11n
Correct Answer: D
Q513. Which of the following tools can be used to measure network performance?
• Ping
• Traceroute
• Wireshark
• All of the above
Correct Answer: D
Q514. Which of the following troubleshooting steps can be used to resolve a connectivity issue?
Correct Answer: D
Q515. Which of the following factors should be considered when designing a network?
Correct Answer: D