How does a stateful firewall differ from a stateless firewall?

  • Stateful firewall and Stateless firewall are the same.
  • Stateful firewall filters packets based solely on static criteria like source and destination. Stateless firewall keeps track of the state of active connections.
  • Stateful firewall keeps track of the state of active connections and makes decisions based on the context of the traffic. Stateless firewall filters packets based solely on static criteria like source and destination.
  • Stateful firewall monitors traffic for malware, while Stateless firewall monitors traffic for suspicious behavior.
A stateful firewall is an advanced firewall that keeps track of the state of active connections, allowing it to make decisions based on the context of the traffic. It is more secure than a stateless firewall that filters packets based solely on static criteria like source and destination addresses.

A startup company in a city's tech hub has just expanded and now occupies two buildings across the street from each other. They want to ensure that their network is seamless across both buildings. What type of network should they consider?

  • LAN
  • MAN
  • PAN
  • WAN
They should consider a WAN (Wide Area Network). A WAN is designed to connect networks across a broad geographic area, which could include connecting multiple buildings in different locations, cities, or even countries. This is necessary for ensuring seamless communication between the two buildings.

Which network security system primarily focuses on detecting and alerting about potential threats, rather than actively blocking them?

  • Antivirus Software
  • Firewall
  • IDS (Intrusion Detection System)
  • IPS (Intrusion Prevention System)
An Intrusion Detection System (IDS) is a network security system that primarily focuses on detecting and alerting about potential threats and security breaches but does not actively block them. It monitors network traffic and system activities for suspicious behavior.

The combination of an IP address and a port number is often referred to as a _________, which helps in directing data to the right application on a machine.

  • Address Pair
  • Gateway
  • Socket
  • URL
The combination of an IP address and a port number is often referred to as a "socket." Sockets are essential for directing data to the correct application or service on a machine in a network, enabling multiple applications to run on a single device and share the same IP address.

Which protocol primarily uses the three-way handshake to establish a connection between client and server?

  • HTTP
  • IP
  • TCP
  • UDP
TCP (Transmission Control Protocol) primarily uses the three-way handshake to establish a connection between a client and a server. This process involves the client and server exchanging a series of messages to confirm and synchronize their communication, ensuring reliable data transfer.

In terms of security, what is the primary advantage of using a VPN when accessing public Wi-Fi hotspots?

  • VPNs block access to public Wi-Fi networks for unauthorized users.
  • VPNs can bypass Wi-Fi login pages.
  • VPNs encrypt data traffic, preventing eavesdropping and enhancing privacy on open Wi-Fi networks.
  • VPNs provide faster internet speeds on public Wi-Fi networks.
The primary advantage of using a VPN (Virtual Private Network) when accessing public Wi-Fi hotspots is that it encrypts your data traffic, preventing potential eavesdropping and enhancing your privacy and security on open and potentially unsecured networks.

Which topology provides the highest fault tolerance due to its multiple connections?

  • Bus
  • Mesh
  • Ring
  • Star
Mesh topology provides the highest fault tolerance due to its multiple connections. In a mesh network, every device is connected to every other device, ensuring redundancy. If one connection fails, traffic can be rerouted through other paths. This makes mesh topology highly fault-tolerant. However, it can be expensive and complex to set up due to the number of connections required.

In Ethernet networks, the frame structure consists of several fields, with the _______ field indicating the type of protocol being used.

  • Payload
  • Destination
  • Type
  • Source
The correct option is "Type." In Ethernet frame structure, the "Type" field specifies the type of protocol being used within the frame. This field helps network devices determine how to interpret the data within the frame, whether it's IP, ARP, or another protocol.

How does Quadrature Amplitude Modulation (QAM) differ from basic amplitude or frequency modulation techniques?

  • QAM combines amplitude and phase modulation
  • QAM does not involve modulation
  • QAM is a form of single-sideband modulation
  • QAM only uses frequency modulation
Quadrature Amplitude Modulation (QAM) is a modulation technique that combines both amplitude and phase modulation. It uses both amplitude and phase shifts to encode multiple bits per symbol, allowing for higher data rates and more efficient use of the spectrum. This is in contrast to basic amplitude or frequency modulation, which use only one of these characteristics for modulation.

In a MAC address, the first three octets, also known as the OUI, identify the _______.

  • Device type
  • Location
  • Manufacturer
  • Network segment
In a MAC (Media Access Control) address, the first three octets are known as the OUI (Organizationally Unique Identifier), and they identify the manufacturer or organization that produced the network card. This allows for unique identification of devices on a network.