John is a network administrator and receives complaints that a particular website is not accessible. He wants to check the IP address associated with the website's domain name. Which tool or command is most suitable for this task?

  • netstat
  • nslookup
  • ping
  • traceroute
The most suitable tool for checking the IP address associated with a domain name is "nslookup." This command-line tool is used to query DNS (Domain Name System) servers to obtain information about domain names, including their corresponding IP addresses. It's a valuable tool for troubleshooting network connectivity issues.

Which system is responsible for translating human-friendly domain names into IP addresses?

  • DNS
  • FTP
  • HTTP
  • TCP
DNS (Domain Name System) is responsible for translating human-readable domain names, like www.example.com, into IP addresses that computers use to identify each other on a network. DNS acts as the internet's "phonebook."

If a malicious actor wants to associate their MAC address with an IP address of another machine, they might conduct an _______ attack.

  • ARP Poisoning
  • DDoS
  • DNS Hijacking
  • IP Spoofing
ARP Poisoning (Address Resolution Protocol Poisoning) is an attack where the attacker associates their MAC address with the IP address of another machine, potentially leading to network disruption or interception of data.

In the context of networking devices, which one is designed to connect two or more network segments and make them function as a single network?

  • Bridge
  • Hub
  • Router
  • Switch
A bridge is designed to connect two or more network segments, typically at the data link layer (Layer 2). It makes them function as a single network by filtering and forwarding traffic based on MAC addresses, creating a larger broadcast domain.

A large multinational company has exhausted its IPv4 address space. They're considering transitioning to another IP version to cater to their expanding network infrastructure. Which IP version should they consider and why?

  • IPv6
  • IPv5
  • IPv7
  • IPv3
IPv6 is the most suitable option for a company that has exhausted its IPv4 address space. IPv6 offers a vastly larger address space, providing trillions of unique addresses, which is essential for accommodating the company's expanding network infrastructure and the growing number of devices. IPv5, IPv7, and IPv3 are not commonly used for general networking purposes.

When an error is detected using the Hamming code, what additional feature does it offer compared to other methods?

  • Compression
  • Data encryption
  • Error correction
  • Scalability
The Hamming code not only detects errors in transmitted data but also corrects them. It's an error-correcting code that adds extra bits to the data to allow the receiver to identify and fix errors. This is a significant advantage over some other error detection methods like CRC, which can only detect errors but not correct them.

Which type of network is optimal for connecting multiple devices within a single room, ensuring minimal latency and maximum data transfer speeds?

  • LAN
  • MAN
  • PAN
  • SAN
LAN (Local Area Network) is optimal for connecting multiple devices within a single room or a confined space. LANs are designed for high-speed data transfer with minimal latency, making them suitable for connecting devices in homes, offices, or campuses.

In terms of error-checking and acknowledgment, which protocol offers a built-in mechanism to ensure data integrity?

  • HTTP
  • IP
  • TCP
  • UDP
TCP (Transmission Control Protocol) offers a built-in mechanism for ensuring data integrity. It does this by using techniques such as error-checking and acknowledgments to confirm that data is received correctly. TCP is a connection-oriented protocol that provides reliable data delivery.

During a file transfer between two systems, a brief network outage occurs. When the connection is restored, the file transfer resumes without any data loss. Which transport layer feature ensures this seamless recovery?

  • Congestion Control
  • Connection-Oriented Communication
  • Error Detection
  • Flow Control
Connection-Oriented Communication is a feature of the transport layer, particularly in protocols like TCP. It ensures that data is reliably transmitted, and in the event of network disruptions or outages, the connection can be reestablished, and the file transfer can resume without data loss.

Real-time applications like VoIP often prefer ________ due to its speed, even at the risk of some data loss.

  • IP
  • SMTP
  • TCP
  • UDP
Real-time applications such as Voice over IP (VoIP) prefer UDP (User Datagram Protocol) due to its speed and low overhead. UDP is a connectionless protocol that offers fast data transmission, making it suitable for applications where a small amount of data loss can be tolerated.

Which IP addressing version uses 32-bit addresses, resulting in approximately 4.3 billion unique addresses?

  • IPv10
  • IPv4
  • IPv6
  • IPv8
IPv4 (Internet Protocol version 4) uses 32-bit addresses, allowing for about 4.3 billion unique addresses. Each address is represented in dotted decimal format, such as 192.168.1.1.

In the context of the sliding window protocol, what does the "window" refer to?

  • The frame synchronization mechanism
  • The number of bits in the data frame
  • The range of sequence numbers of the frames that can be sent without acknowledgment
  • The time it takes for a frame to traverse the network
The "window" in the sliding window protocol refers to the range of sequence numbers of the frames that can be sent by the sender before requiring acknowledgment. This allows for efficient flow control and ensures that the sender does not overwhelm the receiver.