Sunteți pe pagina 1din 2

1. Which protocol does Ping use?

Ans: TCP
2. What does a VLAN do?
Ans: Breaks up broadcast domains in a layer 2 switch internetwork.
3. What is the main reason the OSI model was created?
Ans: different networks could communicate with protocols.
4. What is a stub network?
Ans: A network that has only one entry and exit point.
5. Which class of IP address has the most host addresses available by default?
Ans: Class A
6. Which protocol does DHCP use at the Transport layer?
Ans: UDP
7. Where is a hub specified in the OSI model?
Ans: Physical Layer
8. You want to implement a mechanism that automates the IP configuration,
including IP address, subnet mask, default gateway, and DNS information. Which
protocol will you use to accomplish this?
Ans: DHCP
9. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the
DoD model is equivalent to the Network layer of the OSI model?
Ans: Internet
10. Which class of IP address provides a maximum of only 254 host addresses per
network ID?
Ans: Class C
11. If you use either Telnet or FTP, which is the highest layer you are using to
transmit data?
Ans: Application Layer

12. What are firewalls?

Firewalls serve to protect an internal network from external attacks. These


external threats can be hackers who want to steal data or computer viruses that can
wipe out data in an instant. It also prevents other users from external networks from
gaining access to the private network.
Ans:

13. Which layer 4 protocol is used for a Telnet connection?


Ans: TCP
14. What protocol is used to find the hardware address of a local device?
Ans: ARP
15. Which of the following protocols uses both TCP and UDP?
Ans: DNS

16. What is the main job of the ARP?

The main task of ARP or Address Resolution Protocol is to map a known IP


address to a MAC layer address.
Ans:

17. What is NIC?


Ans: NIC is short for Network Interface Card. This is a peripheral card that is attached to a
PC in order to connect to a network. Every NIC has its own MAC address that identifies the
PC on the network.
18. What are different ways of securing a computer network?

Ans: There are several ways to do this. Install reliable and updated anti-virus program on
all computers. Make sure firewalls are setup and configured properly. User authentication
will also help a lot. All of these combined would make a highly secured network
19. What does 10Base-T mean?
Ans: The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers
to base band, as oppose to broad band. T means twisted pair, which is the cable used for
that network.
20. Which command displays RIP routing updates?
Ans: Debug RIP
21. What is the frequency range of the IEEE 802.11a standard?
Ans: 5Ghz
22. What is the maximum data rate for the 802.11a standard?
Ans: 54Mbps

23. What are the advantages of Distributed Processing?

a. Security/Encapsulation
b. Distributed database
c. Faster Problem solving
d. Security through redundancy
e. Collaborative Processing
Ans:

24. Which line coding technique is used in Internet and networking?


Ans: Manchester
25. How can you identify the IP class of a given IP address?
Ans: By looking at the first octet of any given IP address, you can identify whether its
Class A, B or C. If the first octet begins with a 0 bit, that address is Class A. If it begins
with bits 10 then that address is a Class B address. If it begins with 110, then its a Class C
network.

S-ar putea să vă placă și