A company is setting up its headquarters in a skyscraper. They need a transmission medium that can handle high data rates and is immune to electromagnetic interference from other devices in the building. Which transmission medium should they consider?

  • Coaxial Cable
  • Fiber Optic Cable
  • Twisted Pair Cable
  • Wireless Transmission
Fiber Optic Cable is an ideal choice in this scenario. It offers high data rates, is immune to electromagnetic interference, and can handle data transmission over long distances. It's commonly used in environments with high data requirements and minimal interference tolerance.

In which topology is a single communication path shared among all network devices?

  • Bus
  • Mesh
  • Ring
  • Star
Bus Topology is a network configuration in which all devices are connected to a single communication path, often a single cable. When one device sends data, it is available to all other devices on the network.

Which protocol is specifically designed to transfer files between a client and a server on a network?

  • FTP
  • HTTP
  • POP3
  • SNMP
FTP (File Transfer Protocol) is designed for transferring files between a client and a server on a network. It provides a reliable and efficient way to upload and download files, making it a fundamental protocol for file sharing on the internet.

One of the primary roles of the transport layer is to ensure _______ delivery of data packets.

  • Fast
  • In-order
  • Reliable
  • Secure
The transport layer is responsible for ensuring the reliable delivery of data packets. It uses mechanisms such as acknowledgment and retransmission to make sure data arrives at the destination without errors and in the correct order.

Which security system operates by monitoring network traffic and taking preventive action against threats before they can infiltrate the network?

  • Antivirus
  • Firewall
  • IDS
  • IPS
IPS (Intrusion Prevention System) is a security system that not only detects threats like an IDS but also takes active measures to prevent them from infiltrating the network. It can block or mitigate threats in real-time, making it a crucial component of network security.

Which system is specifically designed to detect malicious activities or policy violations in a network?

  • Firewall
  • IDS
  • IPS
  • Router
IDS (Intrusion Detection System) is a security mechanism designed to monitor network traffic and identify potential threats or policy violations. It can trigger alerts or take actions based on predefined rules or anomalies detected in the network.

In which topology is each device connected to a central hub or switch?

  • Bus
  • Mesh
  • Ring
  • Star
Star Topology is a network layout where each device is directly connected to a central hub or switch. It's a common choice in local area networks (LANs) as it provides easy management and fault isolation.

How does a switch differentiate from a hub in terms of data transmission?

  • A switch broadcasts data to all connected devices.
  • A switch forwards data based on IP addresses.
  • A switch forwards data based on MAC addresses.
  • A switch sends data to all devices except the source.
A switch operates at the data link layer (Layer 2) of the OSI model and uses MAC addresses to make forwarding decisions. It forwards data only to the specific device associated with the destination MAC address, making it more efficient than a hub.

What protocol is typically used by web browsers to retrieve web pages from servers?

  • FTP
  • HTTP
  • IP
  • TCP
HTTP (Hypertext Transfer Protocol) is the protocol used by web browsers to retrieve web pages from web servers. It defines how data is formatted and transmitted over the internet.

A company is sharing sensitive files with another organization. They want to ensure the data is encrypted during transfer. While they have traditionally used FTP, they now need a more secure version. What should they consider?

  • FTPS
  • HTTP
  • SFTP
  • TFTP
The company should consider SFTP (SSH File Transfer Protocol). SFTP is a secure version of FTP that encrypts data during transfer. It uses SSH (Secure Shell) for secure authentication and data encryption, making it suitable for transferring sensitive files over the network.

A company wants to set up a network where each computer is connected to every other computer, allowing for maximum redundancy. Their primary concern is that the network should not fail if any single connection is broken. Which topology should they consider?

  • Bus
  • Mesh
  • Ring
  • Star
The Mesh topology is ideal for maximum redundancy and fault tolerance. In a Mesh network, every device is connected to every other device, which ensures that even if one connection is broken, data can still flow through alternative paths.

Which transport layer protocol is considered connection-oriented and ensures reliable data delivery?

  • HTTP (Hypertext Transfer Protocol)
  • IP (Internet Protocol)
  • TCP (Transmission Control Protocol)
  • UDP (User Datagram Protocol)
TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable data delivery. It establishes a connection between two devices, performs error checking, and retransmits lost or corrupted data to guarantee delivery.