When a VPN establishes a private link over the internet, this process is commonly referred to as what?

  • Encapsulation
  • Fragmentation
  • Routing
  • Tunneling
When a VPN establishes a private link over the internet, this process is commonly referred to as "Tunneling." Tunneling involves encapsulating the data within a secure and encrypted connection, creating a virtual tunnel through which data can safely travel over the public internet, ensuring confidentiality and integrity.

In the context of VPNs, what does "tunneling" specifically refer to?

  • Controlling access to the VPN
  • Encapsulating data in a secure protocol
  • Encrypting the entire network
  • Establishing a direct physical connection
In VPNs, "tunneling" refers to the process of encapsulating data within a secure protocol, often adding an additional layer of encryption to protect the data as it traverses an untrusted network (such as the internet). This ensures the confidentiality and integrity of the data being transmitted.

In a ________ topology, adding or removing devices can be done without disrupting the network.

  • Bus
  • Mesh
  • Ring
  • Star
In a Star topology, adding or removing devices can be done without disrupting the network. In a Star network, all devices are connected to a central hub or switch. If you need to add or remove a device, you can do so without affecting the connectivity of other devices. However, the central hub or switch represents a single point of failure.

In a three-way handshake, after the client sends a SYN packet, the server responds with a _______ packet.

  • ACK
  • FIN
  • RST
  • SYN-ACK
In a TCP three-way handshake, the server responds to the client's SYN (synchronize) packet with a SYN-ACK (synchronize-acknowledgment) packet. This process is a critical part of establishing a reliable connection between the client and server.

In the context of congestion control and flow control, which protocol has built-in mechanisms to handle network congestion?

  • ARP
  • ICMP
  • TCP
  • UDP
TCP (Transmission Control Protocol) includes built-in mechanisms for handling network congestion. It uses techniques like sliding window flow control and congestion avoidance to ensure reliable data delivery and manage network congestion efficiently.

Sarah, a cybersecurity expert, is analyzing network traffic and notices a series of frames with the same source address that doesn't match any known manufacturers. She suspects this is a spoofed address. Which part of the frame is she analyzing?

  • Frame Header
  • IP Address
  • MAC Address
  • Port Number
Sarah is analyzing the MAC address, which is a part of the frame header. The MAC address is a hardware address associated with the source device. A discrepancy in this address might indicate address spoofing, which can be a security concern.

Which technique is used to convert received analog signals back into their original digital form?

  • Decoding
  • Demodulation
  • Encoding
  • Modulation
Demodulation is the technique used to convert received analog signals back into their original digital form. It's the reverse process of modulation and is crucial in the reception of data in analog communication systems.

Which error detection method uses a polynomial division to detect changes to raw data?

  • Checksum
  • Cyclic Redundancy Check (CRC)
  • Hamming code
  • Parity bit
The Cyclic Redundancy Check (CRC) method uses polynomial division to detect changes in raw data. It is a widely used error detection technique that adds a mathematical value (CRC) to the data, which is then transmitted. The recipient performs a similar calculation and compares it with the received CRC to check for errors.

If a user wants to download emails to a local device and remove them from the server, which protocol would typically be used?

  • HTTP
  • IMAP
  • POP3
  • SMTP
POP3 (Post Office Protocol version 3) is typically used when a user wants to download emails from a mail server to a local device and remove them from the server. It is designed for receiving emails.

Which statement best describes Port Address Translation (PAT), a variant of NAT?

  • It assigns a unique public IP address to each internal device.
  • It doesn't allow internal devices to access the internet.
  • It only works with HTTP traffic.
  • It translates multiple private IP addresses to a single public IP address using different ports.
Port Address Translation (PAT) is a variation of Network Address Translation (NAT) in which multiple devices on a local network are translated to a single public IP address, with different port numbers to keep track of which internal device the traffic belongs to. This enables multiple internal devices to share a single public IP address.