A company's IT department notices that their network performance is deteriorating due to excessive broadcast traffic. They want a solution that can isolate different departments while still using the same physical infrastructure. What should they implement?

  • Firewall
  • Hub
  • Router
  • VLAN
Virtual LAN (VLAN) is a solution that can segregate a network into smaller, isolated segments, even if they share the same physical infrastructure. This helps reduce broadcast traffic and allows different departments to communicate efficiently while maintaining network security.

What advantage does fiber optic cabling have over other transmission media when it comes to data security?

  • Easy Installation
  • High Bandwidth
  • Immunity to Eavesdropping
  • Low Latency
Immunity to Eavesdropping - Fiber optic cables offer a high level of data security because they transmit data as light pulses, and it's extremely difficult to intercept these signals without disrupting the communication. Unlike other mediums where electromagnetic signals can be intercepted, fiber optic cables are more secure against eavesdropping.

Real-time applications like VoIP often prefer ________ due to its speed, even at the risk of some data loss.

  • IP
  • SMTP
  • TCP
  • UDP
Real-time applications such as Voice over IP (VoIP) prefer UDP (User Datagram Protocol) due to its speed and low overhead. UDP is a connectionless protocol that offers fast data transmission, making it suitable for applications where a small amount of data loss can be tolerated.

During a file transfer between two systems, a brief network outage occurs. When the connection is restored, the file transfer resumes without any data loss. Which transport layer feature ensures this seamless recovery?

  • Congestion Control
  • Connection-Oriented Communication
  • Error Detection
  • Flow Control
Connection-Oriented Communication is a feature of the transport layer, particularly in protocols like TCP. It ensures that data is reliably transmitted, and in the event of network disruptions or outages, the connection can be reestablished, and the file transfer can resume without data loss.

When considering durability and resistance to external damages, which transmission medium is often seen as the most robust?

  • Coaxial Cable
  • Fiber Optic Cable
  • Twisted Pair Cable
  • Wireless
Fiber Optic Cable is considered the most robust transmission medium. It uses glass or plastic fibers to transmit data as pulses of light, making it immune to electromagnetic interference and highly durable, making it suitable for harsh environments.

A CIDR notation of /16 in an IPv4 address means that the first _______ bits are used for the network prefix.

  • 16
  • 24
  • 32
  • 8
A CIDR notation of /16 in an IPv4 address means that the first 16 bits are used for the network prefix. This notation is used to represent the subnet mask and the network prefix in IPv4 addresses.

A network administrator notices that devices on the network are sending data to an unexpected MAC address, despite the IP address being correct. This could be indicative of which type of issue?

  • ARP Spoofing
  • DNS Hijacking
  • IP Spoofing
  • Packet Fragmentation
When devices on the network send data to an unexpected MAC address while the IP address is correct, it could be indicative of ARP (Address Resolution Protocol) Spoofing. ARP Spoofing is a type of attack where an attacker associates their MAC address with another device's IP address, redirecting traffic meant for that IP address to the attacker's system. This can lead to a security breach. DNS Hijacking, IP Spoofing, and Packet Fragmentation are different issues with distinct characteristics.

In an Ethernet network, the MAC address is typically how many bits in length?

  • 16 bits
  • 48 bits
  • 64 bits
  • 8 bits
In an Ethernet network, the MAC address is typically 48 bits (6 bytes) in length. It is usually represented as a series of 12 hexadecimal characters, separated by colons or hyphens.

In the context of computer networks, what is the primary difference between a PAN and a LAN in terms of coverage and purpose?

  • LAN is designed for personal devices, while PAN connects large business networks.
  • LAN is for connecting personal devices, while PAN connects devices for public access.
  • PAN covers a broader area than LAN and is designed for connecting devices within a city.
  • PAN is typically smaller in coverage, focusing on individual or immediate vicinity connections, whereas LAN serves a more extensive area.
A PAN (Personal Area Network) typically covers a smaller area, focusing on individual or immediate vicinity connections, such as connecting a smartphone to a laptop via Bluetooth. In contrast, a LAN (Local Area Network) serves a more extensive area, typically within a building or campus, connecting devices for personal and business use.

If one node fails in a ________ topology, it does not affect the rest of the network.

  • Bus
  • Mesh
  • Ring
  • Star
In a Star Topology, if one node fails, it does not affect the rest of the network. Each device is directly connected to a central hub or switch, so the failure of one device does not impact the others.