A company is setting up its headquarters in a skyscraper. They need a transmission medium that can handle high data rates and is immune to electromagnetic interference from other devices in the building. Which transmission medium should they consider?

  • Coaxial Cable
  • Fiber Optic Cable
  • Twisted Pair Cable
  • Wireless Transmission
Fiber Optic Cable is an ideal choice in this scenario. It offers high data rates, is immune to electromagnetic interference, and can handle data transmission over long distances. It's commonly used in environments with high data requirements and minimal interference tolerance.

Which system is specifically designed to detect malicious activities or policy violations in a network?

  • Firewall
  • IDS
  • IPS
  • Router
IDS (Intrusion Detection System) is a security mechanism designed to monitor network traffic and identify potential threats or policy violations. It can trigger alerts or take actions based on predefined rules or anomalies detected in the network.

In a frame structure, what is the main purpose of the preamble field?

  • Data encryption
  • Delimiting frames
  • Error checking
  • Synchronization
The main purpose of the preamble field in a frame is to provide synchronization between sender and receiver. It consists of a specific bit pattern that helps the receiving device identify the start of a frame and synchronize its clock with the sender's clock.

To ensure that incoming packets on a specific port reach a particular server in a private network, administrators can set up _______ using NAT.

  • Firewall Rules
  • Load Balancing
  • Port Forwarding
  • Subnetting
Port Forwarding is a technique used to direct incoming network traffic on a specific port to a designated server or device within a private network. This is commonly achieved through NAT (Network Address Translation) configurations.

In an international online gaming tournament, players from around the world need to ensure minimal latency and packet loss. The effectiveness of this is largely dependent on which aspect of networking?

  • Bandwidth
  • Network Topology
  • Quality of Service (QoS)
  • Routing Protocol
Quality of Service (QoS) is crucial in this context. QoS ensures that the network can prioritize gaming traffic to minimize latency and packet loss, providing a better gaming experience for players.

A device's _______ address remains constant even if its IP address changes within a network.

  • DHCP
  • DNS
  • IP
  • MAC
A device's MAC (Media Access Control) address is a unique hardware address assigned to the network card and remains constant, even if the device's IP address changes within a network due to dynamic addressing from DHCP.

Which transport layer protocol is considered connection-oriented and ensures reliable data delivery?

  • HTTP (Hypertext Transfer Protocol)
  • IP (Internet Protocol)
  • TCP (Transmission Control Protocol)
  • UDP (User Datagram Protocol)
TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable data delivery. It establishes a connection between two devices, performs error checking, and retransmits lost or corrupted data to guarantee delivery.

A company wants to set up a network where each computer is connected to every other computer, allowing for maximum redundancy. Their primary concern is that the network should not fail if any single connection is broken. Which topology should they consider?

  • Bus
  • Mesh
  • Ring
  • Star
The Mesh topology is ideal for maximum redundancy and fault tolerance. In a Mesh network, every device is connected to every other device, which ensures that even if one connection is broken, data can still flow through alternative paths.

A company is sharing sensitive files with another organization. They want to ensure the data is encrypted during transfer. While they have traditionally used FTP, they now need a more secure version. What should they consider?

  • FTPS
  • HTTP
  • SFTP
  • TFTP
The company should consider SFTP (SSH File Transfer Protocol). SFTP is a secure version of FTP that encrypts data during transfer. It uses SSH (Secure Shell) for secure authentication and data encryption, making it suitable for transferring sensitive files over the network.

What protocol is typically used by web browsers to retrieve web pages from servers?

  • FTP
  • HTTP
  • IP
  • TCP
HTTP (Hypertext Transfer Protocol) is the protocol used by web browsers to retrieve web pages from web servers. It defines how data is formatted and transmitted over the internet.