Which network type spans a large geographic area, often connecting multiple cities or even countries?

  • LAN
  • MAN
  • PAN
  • WAN
WAN (Wide Area Network) is a network that covers a broad area, connecting multiple LANs that might be on opposite sides of the world. It can span cities, states, or even countries. The internet is the largest example of a WAN.

To reduce collision domains in an Ethernet network, one might use a _______ instead of a hub.

  • Router
  • Switch
  • Modem
  • Repeater
The correct option is "Switch." Using a switch instead of a hub can help reduce collision domains in an Ethernet network. A switch is an intelligent device that forwards data only to the specific port where the destination device is located, reducing unnecessary traffic and collisions.

Which basic error detection method involves adding an extra bit to data to make the number of ones either even or odd?

  • CRC (Cyclic Redundancy Check)
  • Checksum
  • Hamming Code
  • Parity Bit
The Parity Bit is a basic error detection method that involves adding an extra bit to data to make the number of ones either even or odd. By checking this bit at the receiving end, errors can be detected in the transmitted data.

In a newly set up office, the network administrator observes that when one device broadcasts data, all other devices receive it, leading to potential data privacy concerns. Which device is most likely causing this behavior?

  • Bridge
  • Hub
  • Router
  • Switch
A Hub operates at the physical layer of the OSI model and broadcasts data to all devices in the network. It does not have intelligence to direct data only to the intended recipient, which can result in data privacy concerns.

Which flow control mechanism allows a receiver to handle multiple frames before sending an acknowledgment?

  • Go-Back-N
  • Selective Repeat
  • Sliding Window
  • Stop-and-Wait
Sliding Window is a flow control mechanism that allows a receiver to handle multiple frames before sending an acknowledgment. It helps optimize network efficiency by allowing the sender to transmit several frames before waiting for acknowledgments.

A _______ analyzes incoming and outgoing traffic to allow or block data packets based on a set of security rules.

  • Firewall
  • Router
  • Switch
  • VPN
A Firewall is a network security device or software that monitors and controls incoming and outgoing network traffic. It enforces a set of security rules to determine whether to allow or block data packets, thus protecting a network from unauthorized access or potential threats.

How does the sliding window protocol handle situations when the receiver's buffer is almost full?

  • It drops the packets
  • It increases the window size
  • It reduces the window size
  • It sends a request to the sender to stop transmission
The sliding window protocol handles situations when the receiver's buffer is almost full by reducing the window size. This is done to prevent overwhelming the receiver with data it cannot handle, ensuring smooth and efficient data transfer.

Which of the following protocols uses port 80 by default?

  • FTP
  • HTTP
  • HTTPS
  • SMTP
HTTP (Hypertext Transfer Protocol) uses port 80 by default. It is the protocol used for transmitting web pages and data on the World Wide Web. When you enter a website's URL without specifying a port, your browser assumes port 80 for HTTP.

OSPF belongs to which class of routing protocols that use the state of links as their primary metric?

  • Distance Vector
  • Hybrid
  • Link-State
  • Path Vector
OSPF (Open Shortest Path First) belongs to the Link-State class of routing protocols. In Link-State routing, routers exchange information about the state of their links, and each router builds a database that contains a complete map of the network's topology. This information is used to calculate the shortest path.

A data center is experiencing issues with data corruption during transmission. They implement a new error detection mechanism and find that while most errors are caught, some still slip through. They decide to add an additional layer of error detection for critical data. Which combination of methods might they use?

  • CRC (Cyclic Redundancy Check) for error detection and Reed-Solomon Code for error correction
  • Checksum for error detection and VRC (Vertical Redundancy Check) for error correction
  • LRC (Longitudinal Redundancy Check) for error detection and CRC for error correction
  • Parity Bit for error detection and Hamming Code for error correction
Adding CRC for error detection is a common practice. For critical data, combining CRC for detection with Reed-Solomon Code for error correction is a robust approach, as CRC helps identify errors and Reed-Solomon corrects them.