A company wants to enable its employees to work from home due to a sudden lockdown. To ensure that employees can access company resources securely, what technology should the company employ?

  • DNS (Domain Name System)
  • Firewall
  • Intrusion Detection System (IDS)
  • VPN (Virtual Private Network)
The company should employ a VPN (Virtual Private Network). A VPN establishes a secure, encrypted connection between employees' devices and the company's network, allowing remote access to company resources while maintaining security and privacy.

In terms of network design, what is the primary advantage of using bridges?

  • Enhancing scalability and reducing latency.
  • Improving security through access control.
  • Increasing network bandwidth and optimizing routing.
  • Reducing collision domains and filtering traffic at the data link layer.
Bridges are used to reduce collision domains and filter traffic at the data link layer, which helps in network design to decrease collisions and improve network performance.

Which Ethernet standard is commonly used for Gigabit Ethernet in most modern local area networks?

  • 10Base-T
  • 100Base-FX
  • 1000Base-T
  • 100Base-T
Gigabit Ethernet in most modern local area networks commonly uses the 1000Base-T standard, which operates at 1 Gbps (1000 Mbps) over twisted-pair cabling, such as Cat 5e or Cat 6.

Imagine you're monitoring a network and notice that a client sends a SYN packet but doesn't receive a SYN-ACK response from the server. Instead, the client keeps retransmitting the SYN packet. What might be a likely reason for this behavior?

  • Firewall Blocking
  • MTU Mismatch
  • Network Congestion
  • Wrong IP Address
Network Congestion is a common reason for a client not receiving a SYN-ACK response. When the network is congested, packets may be dropped or delayed, leading to retransmissions. A SYN-ACK is the second step in the TCP three-way handshake, and if it's not received, the client will retransmit the SYN packet.

The transition mechanism that allows IPv6 networks to communicate with IPv4 networks by embedding an IPv4 address inside an IPv6 address is known as _______.

  • Dual-Stack
  • ICMPv6
  • NAT44
  • NAT64
NAT64 (Network Address Translation 64) is a transition mechanism that enables communication between IPv6 and IPv4 networks. It works by mapping IPv6 addresses to embedded IPv4 addresses, allowing communication between the two different protocol versions.

Which portion of the MAC address indicates the manufacturer of the Network Interface Card (NIC)?

  • The entire MAC address.
  • The first six hexadecimal characters (24 bits) of the MAC address.
  • The last six hexadecimal characters (24 bits) of the MAC address.
  • The middle six hexadecimal characters (24 bits) of the MAC address.
The first six hexadecimal characters of the MAC address are known as the Organizationally Unique Identifier (OUI) and are assigned to NIC manufacturers. These characters help identify the manufacturer of the NIC.

What is the primary purpose of the DNS "A" record?

  • Resolves domain names to hostnames
  • Resolves hostnames to IPv4 addresses
  • Resolves hostnames to IPv6 addresses
  • Resolves hostnames to domain names
The primary purpose of the DNS "A" record is to resolve hostnames to IPv4 addresses. This allows your web browser to find the IP address associated with a domain name when you enter a URL, enabling you to connect to the correct web server.

How many bits are used to represent an IPv6 address?

  • 128 bits
  • 256 bits
  • 32 bits
  • 64 bits
An IPv6 address is represented using 128 bits, which allows for a significantly larger number of unique IP addresses compared to IPv4. IPv6 was developed to address the growing shortage of IPv4 addresses.

Which security system operates by monitoring network traffic and taking preventive action against threats before they can infiltrate the network?

  • Antivirus
  • Firewall
  • IDS
  • IPS
IPS (Intrusion Prevention System) is a security system that not only detects threats like an IDS but also takes active measures to prevent them from infiltrating the network. It can block or mitigate threats in real-time, making it a crucial component of network security.

One of the primary roles of the transport layer is to ensure _______ delivery of data packets.

  • Fast
  • In-order
  • Reliable
  • Secure
The transport layer is responsible for ensuring the reliable delivery of data packets. It uses mechanisms such as acknowledgment and retransmission to make sure data arrives at the destination without errors and in the correct order.