In which topology is a single communication path shared among all network devices?
- Bus
- Mesh
- Ring
- Star
Bus Topology is a network configuration in which all devices are connected to a single communication path, often a single cable. When one device sends data, it is available to all other devices on the network.
In which topology is each device connected to a central hub or switch?
- Bus
- Mesh
- Ring
- Star
Star Topology is a network layout where each device is directly connected to a central hub or switch. It's a common choice in local area networks (LANs) as it provides easy management and fault isolation.
Which system is specifically designed to detect malicious activities or policy violations in a network?
- Firewall
- IDS
- IPS
- Router
IDS (Intrusion Detection System) is a security mechanism designed to monitor network traffic and identify potential threats or policy violations. It can trigger alerts or take actions based on predefined rules or anomalies detected in the network.
In a frame structure, what is the main purpose of the preamble field?
- Data encryption
- Delimiting frames
- Error checking
- Synchronization
The main purpose of the preamble field in a frame is to provide synchronization between sender and receiver. It consists of a specific bit pattern that helps the receiving device identify the start of a frame and synchronize its clock with the sender's clock.
To ensure that incoming packets on a specific port reach a particular server in a private network, administrators can set up _______ using NAT.
- Firewall Rules
- Load Balancing
- Port Forwarding
- Subnetting
Port Forwarding is a technique used to direct incoming network traffic on a specific port to a designated server or device within a private network. This is commonly achieved through NAT (Network Address Translation) configurations.
In an international online gaming tournament, players from around the world need to ensure minimal latency and packet loss. The effectiveness of this is largely dependent on which aspect of networking?
- Bandwidth
- Network Topology
- Quality of Service (QoS)
- Routing Protocol
Quality of Service (QoS) is crucial in this context. QoS ensures that the network can prioritize gaming traffic to minimize latency and packet loss, providing a better gaming experience for players.
A device's _______ address remains constant even if its IP address changes within a network.
- DHCP
- DNS
- IP
- MAC
A device's MAC (Media Access Control) address is a unique hardware address assigned to the network card and remains constant, even if the device's IP address changes within a network due to dynamic addressing from DHCP.
Which transport layer protocol is considered connection-oriented and ensures reliable data delivery?
- HTTP (Hypertext Transfer Protocol)
- IP (Internet Protocol)
- TCP (Transmission Control Protocol)
- UDP (User Datagram Protocol)
TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable data delivery. It establishes a connection between two devices, performs error checking, and retransmits lost or corrupted data to guarantee delivery.
A company wants to set up a network where each computer is connected to every other computer, allowing for maximum redundancy. Their primary concern is that the network should not fail if any single connection is broken. Which topology should they consider?
- Bus
- Mesh
- Ring
- Star
The Mesh topology is ideal for maximum redundancy and fault tolerance. In a Mesh network, every device is connected to every other device, which ensures that even if one connection is broken, data can still flow through alternative paths.
A company is sharing sensitive files with another organization. They want to ensure the data is encrypted during transfer. While they have traditionally used FTP, they now need a more secure version. What should they consider?
- FTPS
- HTTP
- SFTP
- TFTP
The company should consider SFTP (SSH File Transfer Protocol). SFTP is a secure version of FTP that encrypts data during transfer. It uses SSH (Secure Shell) for secure authentication and data encryption, making it suitable for transferring sensitive files over the network.