The MAC address is often referred to as a physical or _______ address in the context of networking.
- Hardware
- Logical
- Network
- Virtual
The correct answer is "Hardware" address. The MAC address is often referred to as a "hardware" address because it is a physical and unique identifier assigned to the network interface hardware of a device. It's used for low-level communication within a network.
A company is upgrading its office network to accommodate higher data transfer speeds. They are moving from 100 Mbps to 1 Gbps. Which Ethernet standard are they most likely adopting for this upgrade?
- Ethernet 1000BASE-FX
- Ethernet 1000BASE-T
- Ethernet 100BASE-T
- Ethernet 10BASE-T
The Ethernet standard for 1 Gbps is 1000BASE-T, which is commonly used for Gigabit Ethernet connections over twisted-pair cabling.
In the context of IPv4, which of the following subnets provides the least number of host addresses: /24, /26, /28, or /30?
- /24
- /26
- /28
- /30
A subnet with a /30 prefix provides the least number of host addresses in IPv4. It allocates 2 host addresses (1 for the network address and 1 for the broadcast address), making it suitable for point-to-point connections.
The ________ mechanism in TCP ensures that data packets arrive in the correct sequence at the receiver's end.
- Acknowledgment
- Flow Control
- Segmentation
- Synchronization
The Synchronization mechanism in TCP (Transmission Control Protocol) ensures that data packets arrive in the correct sequence at the receiver's end. TCP uses sequence numbers and acknowledgments to manage data flow and guarantee reliable communication.
A financial institution is noticing a lot of unauthorized login attempts on its server. They want a system that can alert them of these attempts without necessarily blocking them. Which system should they consider?
- Antivirus Software
- Firewall
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
The financial institution should consider an Intrusion Detection System (IDS). An IDS monitors network traffic and system activities, detecting and alerting on suspicious behavior, such as unauthorized login attempts, without taking any direct action to block them.
What is the primary purpose of subnetting in IP networks?
- To divide a larger IP network into smaller, more manageable subnetworks
- To improve network security
- To increase the physical size of a network
- To simplify IP address management
Subnetting is primarily used to divide a larger IP network into smaller, more manageable subnetworks. It helps in efficient IP address allocation and routing by allowing networks to be logically segmented for administrative, security, and scalability purposes.
How do modern switches handle broadcast frames?
- They analyze broadcast frames and forward them intelligently.
- They convert broadcast frames into unicast frames.
- They drop broadcast frames to reduce network traffic.
- They forward broadcast frames to all devices on the network.
Modern switches typically forward broadcast frames to all devices on the network. While this can increase network traffic, it ensures that broadcast messages reach all devices on the local network.
Which protocol allows for both the synchronization of emails across multiple devices and the storage of emails on the server?
- FTP
- IMAP
- POP3
- SMTP
IMAP (Internet Message Access Protocol) is used for email synchronization across multiple devices and allows the storage of emails on the server. It is designed for managing email in a way that's accessible from different devices.
Why might a network administrator choose to implement VLANs on a switch?
- To improve routing between networks.
- To increase the physical size of a network.
- To reduce latency in network communication.
- To segment a large network into smaller, isolated broadcast domains.
Network administrators implement Virtual LANs (VLANs) on switches to segment a large network into smaller, isolated broadcast domains. This reduces broadcast traffic and enhances network security by isolating groups of devices.
Among RIP, OSPF, and BGP, which one is considered an interior gateway protocol (IGP) that's mainly used for routing within an autonomous system?
- BGP
- None of the above
- OSPF
- RIP
OSPF (Open Shortest Path First) is an interior gateway protocol (IGP) used for routing within an autonomous system. It's designed for routing within a single organization's network and provides more advanced features compared to RIP.