The technique where multiple private IP addresses are mapped to a single public IP address but with different ports is known as _______.

  • IP Address Translation
  • Port Address Translation
  • Subnetting
  • VLAN
Port Address Translation (PAT) is a method used in NAT (Network Address Translation) to map multiple private IP addresses to a single public IP address, differentiating them by port numbers. PAT is used to conserve public IP addresses in scenarios with limited address space.

If an application requires a lightweight transport protocol without the overhead of establishing and tearing down connections, which protocol should be considered?

  • HTTP
  • ICMP
  • TCP
  • UDP
UDP (User Datagram Protocol) is a lightweight transport protocol that doesn't involve the overhead of establishing and tearing down connections like TCP. It's suitable for applications that prioritize speed and simplicity over reliability, such as real-time streaming or online gaming.

How does a stateful firewall differ from a stateless firewall?

  • Stateful firewall and Stateless firewall are the same.
  • Stateful firewall filters packets based solely on static criteria like source and destination. Stateless firewall keeps track of the state of active connections.
  • Stateful firewall keeps track of the state of active connections and makes decisions based on the context of the traffic. Stateless firewall filters packets based solely on static criteria like source and destination.
  • Stateful firewall monitors traffic for malware, while Stateless firewall monitors traffic for suspicious behavior.
A stateful firewall is an advanced firewall that keeps track of the state of active connections, allowing it to make decisions based on the context of the traffic. It is more secure than a stateless firewall that filters packets based solely on static criteria like source and destination addresses.

A startup company in a city's tech hub has just expanded and now occupies two buildings across the street from each other. They want to ensure that their network is seamless across both buildings. What type of network should they consider?

  • LAN
  • MAN
  • PAN
  • WAN
They should consider a WAN (Wide Area Network). A WAN is designed to connect networks across a broad geographic area, which could include connecting multiple buildings in different locations, cities, or even countries. This is necessary for ensuring seamless communication between the two buildings.

Which network security system primarily focuses on detecting and alerting about potential threats, rather than actively blocking them?

  • Antivirus Software
  • Firewall
  • IDS (Intrusion Detection System)
  • IPS (Intrusion Prevention System)
An Intrusion Detection System (IDS) is a network security system that primarily focuses on detecting and alerting about potential threats and security breaches but does not actively block them. It monitors network traffic and system activities for suspicious behavior.

In which flow control method does the sender transmit a single frame and wait for an acknowledgment before sending the next frame?

  • Go-Back-N
  • Selective Repeat
  • Sliding Window
  • Stop-and-Wait
Stop-and-Wait is a flow control method where the sender transmits a single frame and waits for an acknowledgment before sending the next frame. It is a simple method but not very efficient as it has a high overhead due to frequent acknowledgments.

If a multinational corporation wanted to interconnect its offices across continents, which type of network would be most appropriate?

  • LAN
  • MAN
  • PAN
  • WAN
WAN (Wide Area Network) would be most appropriate for interconnecting offices across continents. WANs cover a vast geographic area, making them suitable for connecting networks in different cities, countries, and even continents. They provide the necessary infrastructure for global connectivity, such as the internet.

In which scenario would ARP poisoning be a concern for network administrators?

  • When a router is upgraded
  • When a server goes down temporarily
  • When a switch is replaced
  • When an attacker tries to impersonate another device by poisoning the ARP cache
ARP poisoning is a concern when an attacker tries to impersonate another device on the network by poisoning the ARP cache of the target device. This can lead to man-in-the-middle attacks, where the attacker intercepts and potentially alters network traffic. Network administrators need to be vigilant in detecting and preventing ARP poisoning attacks.

A company is designing a new video conferencing application. They want to ensure real-time communication with minimal delay. However, they can tolerate a minor loss of data during transmission. Which transport protocol should they consider for their application?

  • HTTP
  • SMTP
  • TCP
  • UDP
UDP (User Datagram Protocol) is the best choice in this scenario. UDP is a connectionless protocol that provides minimal delay and is suitable for real-time communication. While it doesn't guarantee data delivery, it is commonly used in applications like video conferencing and online gaming where low latency is more critical than perfect data integrity.

In a typical home router setup, NAT allows multiple devices to share a single what?

  • MAC address
  • IP address
  • Port number
  • Subnet mask
In a typical home router setup, NAT allows multiple devices to share a single IP address. This enables multiple devices within a local network to access the internet using a single public IP address, conserving the limited pool of available public IP addresses and providing a degree of security by hiding internal device addresses from the internet.