Which network security system primarily focuses on detecting and alerting about potential threats, rather than actively blocking them?

  • Antivirus Software
  • Firewall
  • IDS (Intrusion Detection System)
  • IPS (Intrusion Prevention System)
An Intrusion Detection System (IDS) is a network security system that primarily focuses on detecting and alerting about potential threats and security breaches but does not actively block them. It monitors network traffic and system activities for suspicious behavior.

In which flow control method does the sender transmit a single frame and wait for an acknowledgment before sending the next frame?

  • Go-Back-N
  • Selective Repeat
  • Sliding Window
  • Stop-and-Wait
Stop-and-Wait is a flow control method where the sender transmits a single frame and waits for an acknowledgment before sending the next frame. It is a simple method but not very efficient as it has a high overhead due to frequent acknowledgments.

If a multinational corporation wanted to interconnect its offices across continents, which type of network would be most appropriate?

  • LAN
  • MAN
  • PAN
  • WAN
WAN (Wide Area Network) would be most appropriate for interconnecting offices across continents. WANs cover a vast geographic area, making them suitable for connecting networks in different cities, countries, and even continents. They provide the necessary infrastructure for global connectivity, such as the internet.

In which scenario would ARP poisoning be a concern for network administrators?

  • When a router is upgraded
  • When a server goes down temporarily
  • When a switch is replaced
  • When an attacker tries to impersonate another device by poisoning the ARP cache
ARP poisoning is a concern when an attacker tries to impersonate another device on the network by poisoning the ARP cache of the target device. This can lead to man-in-the-middle attacks, where the attacker intercepts and potentially alters network traffic. Network administrators need to be vigilant in detecting and preventing ARP poisoning attacks.

A company is designing a new video conferencing application. They want to ensure real-time communication with minimal delay. However, they can tolerate a minor loss of data during transmission. Which transport protocol should they consider for their application?

  • HTTP
  • SMTP
  • TCP
  • UDP
UDP (User Datagram Protocol) is the best choice in this scenario. UDP is a connectionless protocol that provides minimal delay and is suitable for real-time communication. While it doesn't guarantee data delivery, it is commonly used in applications like video conferencing and online gaming where low latency is more critical than perfect data integrity.

In a typical home router setup, NAT allows multiple devices to share a single what?

  • MAC address
  • IP address
  • Port number
  • Subnet mask
In a typical home router setup, NAT allows multiple devices to share a single IP address. This enables multiple devices within a local network to access the internet using a single public IP address, conserving the limited pool of available public IP addresses and providing a degree of security by hiding internal device addresses from the internet.

Which device primarily operates at the Data Link Layer of the OSI model to forward frames based on MAC addresses?

  • Hub
  • Modem
  • Router
  • Switch
A Switch primarily operates at the Data Link Layer (Layer 2) of the OSI model. It uses MAC addresses to forward frames within a local area network (LAN). Switches are essential for network segmentation and reducing collision domains, providing efficient data transfer within a network.

Which email protocol provides functionalities like marking an email as read or unread and maintaining the same status across different devices?

  • HTTP
  • IMAP
  • POP3
  • SMTP
IMAP (Internet Message Access Protocol) provides functionalities like marking an email as read or unread and maintaining the same status across different devices. It allows users to manage their email inboxes more efficiently, and any changes made to emails' status are reflected consistently, regardless of the device used to access the email account.

Which device is used to divide a large LAN into smaller segments and operates by filtering frames?

  • Hub
  • Modem
  • Router
  • Switch
A Switch is used to divide a large LAN into smaller segments and operates by filtering frames based on MAC addresses. It is primarily used for network segmentation and efficiently forwarding frames within a LAN, reducing collision domains.

The technique where multiple private IP addresses are mapped to a single public IP address but with different ports is known as _______.

  • IP Address Translation
  • Port Address Translation
  • Subnetting
  • VLAN
Port Address Translation (PAT) is a method used in NAT (Network Address Translation) to map multiple private IP addresses to a single public IP address, differentiating them by port numbers. PAT is used to conserve public IP addresses in scenarios with limited address space.