When a web server listens for incoming client requests, it typically does so on ________ port number for HTTP.

  • Port 22
  • Port 25
  • Port 443
  • Port 80
Web servers typically listen on Port 80 for HTTP (Hypertext Transfer Protocol) traffic. Port 80 is the standard port for unsecured web traffic, while Port 443 is commonly used for secure HTTP (HTTPS).

If one node fails in a ________ topology, it does not affect the rest of the network.

  • Bus
  • Mesh
  • Ring
  • Star
In a Star Topology, if one node fails, it does not affect the rest of the network. Each device is directly connected to a central hub or switch, so the failure of one device does not impact the others.

In the context of computer networks, what is the primary difference between a PAN and a LAN in terms of coverage and purpose?

  • LAN is designed for personal devices, while PAN connects large business networks.
  • LAN is for connecting personal devices, while PAN connects devices for public access.
  • PAN covers a broader area than LAN and is designed for connecting devices within a city.
  • PAN is typically smaller in coverage, focusing on individual or immediate vicinity connections, whereas LAN serves a more extensive area.
A PAN (Personal Area Network) typically covers a smaller area, focusing on individual or immediate vicinity connections, such as connecting a smartphone to a laptop via Bluetooth. In contrast, a LAN (Local Area Network) serves a more extensive area, typically within a building or campus, connecting devices for personal and business use.

In an Ethernet network, the MAC address is typically how many bits in length?

  • 16 bits
  • 48 bits
  • 64 bits
  • 8 bits
In an Ethernet network, the MAC address is typically 48 bits (6 bytes) in length. It is usually represented as a series of 12 hexadecimal characters, separated by colons or hyphens.

A network administrator notices that devices on the network are sending data to an unexpected MAC address, despite the IP address being correct. This could be indicative of which type of issue?

  • ARP Spoofing
  • DNS Hijacking
  • IP Spoofing
  • Packet Fragmentation
When devices on the network send data to an unexpected MAC address while the IP address is correct, it could be indicative of ARP (Address Resolution Protocol) Spoofing. ARP Spoofing is a type of attack where an attacker associates their MAC address with another device's IP address, redirecting traffic meant for that IP address to the attacker's system. This can lead to a security breach. DNS Hijacking, IP Spoofing, and Packet Fragmentation are different issues with distinct characteristics.

A CIDR notation of /16 in an IPv4 address means that the first _______ bits are used for the network prefix.

  • 16
  • 24
  • 32
  • 8
A CIDR notation of /16 in an IPv4 address means that the first 16 bits are used for the network prefix. This notation is used to represent the subnet mask and the network prefix in IPv4 addresses.

When considering durability and resistance to external damages, which transmission medium is often seen as the most robust?

  • Coaxial Cable
  • Fiber Optic Cable
  • Twisted Pair Cable
  • Wireless
Fiber Optic Cable is considered the most robust transmission medium. It uses glass or plastic fibers to transmit data as pulses of light, making it immune to electromagnetic interference and highly durable, making it suitable for harsh environments.

A startup wants to ensure that its website is accessible via both "www.example.com" and "example.com". Which DNS record should they configure to achieve this redirection?

  • A
  • CNAME
  • MX
  • PTR
To achieve redirection from "www.example.com" to "example.com," the startup should configure a CNAME (Canonical Name) record. A CNAME record points one domain name to another, effectively allowing multiple domain names to resolve to the same website.

Which transmission medium is most susceptible to electromagnetic interference but is commonly used for cable TV?

  • Coaxial Cable
  • Fiber Optic Cable
  • Twisted Pair Cable
  • Wireless
Coaxial Cable is commonly used for cable TV. It is susceptible to electromagnetic interference due to its copper core and outer shielding. This interference can affect signal quality, but its affordability and bandwidth make it a popular choice for cable television.

What is the primary purpose of flow control in computer networks?

  • Ensuring data encryption
  • Managing data routing
  • Minimizing network congestion
  • Preventing data loss and overwhelming receivers
The primary purpose of flow control in computer networks is to prevent data loss and overwhelming receivers. Flow control mechanisms and methods help regulate the pace of data transmission to ensure that the receiver can process and acknowledge data effectively, preventing network congestion and data loss.

Which routing protocol is widely used on the internet for routing between different autonomous systems?

  • BGP
  • EIGRP
  • OSPF
  • RIP
BGP (Border Gateway Protocol) is a path vector routing protocol used on the internet for routing between different autonomous systems. It's crucial for inter-domain routing and helps in making core routing decisions.

Which entity in the transport layer is responsible for directing a piece of data to a specific process running on a machine?

  • DNS
  • IP Address
  • MAC Address
  • Port Number
Port Numbers are responsible for directing a piece of data to a specific process running on a machine. Ports allow multiple processes on the same machine to use network resources simultaneously.