In a MAC address, the first three octets, also known as the OUI, identify the _______.

  • Device type
  • Location
  • Manufacturer
  • Network segment
In a MAC (Media Access Control) address, the first three octets are known as the OUI (Organizationally Unique Identifier), and they identify the manufacturer or organization that produced the network card. This allows for unique identification of devices on a network.

During the three-way handshake, what is the first message type sent by the client?

  • ACK
  • FIN
  • RST
  • SYN
The first message sent by the client during the three-way handshake is the SYN (Synchronize) packet. It is used to initiate the connection setup process by indicating the sequence number for data exchange and request a response from the server.

In terms of scale, which network lies between a LAN and a WAN, often covering a city or a large campus?

  • LAN
  • MAN
  • PAN
  • WAN
MAN (Metropolitan Area Network) is a network that typically covers a city or a large campus. It has a larger geographic scope than a LAN (Local Area Network) but is smaller than a WAN (Wide Area Network). MANs are often used by service providers to connect multiple LANs within a city.

What does the acronym MAC in MAC Address stand for?

  • Media Access Control
  • Memory Access Control
  • Message Access Control
  • Modem Access Control
MAC in MAC Address stands for "Media Access Control." It is a hardware address that uniquely identifies each node on a network, and it's used to control access to the network medium.

Julia is a digital nomad who works from various countries. She needs a network that can provide her with consistent connectivity regardless of her location, connecting her to her company's servers back in her home country. Which network type best serves Julia's needs?

  • LAN
  • PAN
  • VPN
  • WLAN
Julia should use a VPN (Virtual Private Network). A VPN allows users to securely connect to their company's network over the internet, providing consistent and secure connectivity, no matter where Julia is located. It ensures that her data is encrypted and private.

If an email client is set up to delete messages from the server after downloading, it's most likely using the _______ protocol.

  • HTTP
  • IMAP
  • POP3
  • SMTP
POP3 (Post Office Protocol version 3) is commonly used for email clients that download messages from the server and delete them from the server after retrieval. It's a one-way communication protocol for email.

After receiving an ACK during the three-way handshake, what step does the server take to complete the connection establishment?

  • None of the above
  • Sending Data
  • Sending a FIN
  • Sending a SYN
After the three-way handshake is completed by the server receiving an ACK (Acknowledgment) from the client, the server can start sending data over the established connection. This data transfer phase follows the initial connection setup.

In the realm of error correction, how does the Hamming distance contribute to determining the number of errors?

  • Hamming distance helps determine the location and number of errors
  • Hamming distance is unrelated to error correction
  • Hamming distance is used to find synchronization errors
  • Hamming distance is used to measure the error rate
The Hamming distance is used to determine the number and location of errors in error-correcting codes. It measures the number of differing bits between two binary sequences and helps identify the exact bit positions that need correction. A smaller Hamming distance indicates a better error-correcting capability of the code.

The ________ topology connects all devices directly to each other, offering high redundancy.

  • Bus
  • Mesh
  • Ring
  • Star
Mesh Topology is a network layout where every device connects directly to every other device. This provides the highest level of redundancy and fault tolerance but can be expensive to implement and maintain.

The process of establishing a connection, transmitting data, and then terminating the connection is characteristic of the ________ protocol.

  • FTP
  • POP3
  • SMTP
  • TCP
The process of establishing a connection, transmitting data, and then terminating the connection is characteristic of the TCP (Transmission Control Protocol). TCP is a reliable, connection-oriented protocol used in many network applications, ensuring data integrity and order.