How does a switch differentiate from a hub in terms of data transmission?
- A switch broadcasts data to all connected devices.
- A switch forwards data based on IP addresses.
- A switch forwards data based on MAC addresses.
- A switch sends data to all devices except the source.
A switch operates at the data link layer (Layer 2) of the OSI model and uses MAC addresses to make forwarding decisions. It forwards data only to the specific device associated with the destination MAC address, making it more efficient than a hub.
In which topology is each device connected to a central hub or switch?
- Bus
- Mesh
- Ring
- Star
Star Topology is a network layout where each device is directly connected to a central hub or switch. It's a common choice in local area networks (LANs) as it provides easy management and fault isolation.
What is the primary purpose of protocols in computer networking?
- To ensure data security
- To provide physical network infrastructure
- To facilitate communication between devices
- To display web pages
The primary purpose of protocols in computer networking is to facilitate communication between devices. Networking protocols define a set of rules and conventions that devices follow to communicate effectively on a network. These rules govern how data is formatted, transmitted, received, and processed across the network.
When a company wants to divide its IP address space into smaller, more manageable blocks, it is engaging in ___________.
- Port forwarding
- Subnetting
- Supernetting
- VLAN configuration
Subnetting is the process of dividing an IP address space into smaller, more manageable blocks, often called subnets. It is used to efficiently allocate IP addresses and improve network organization and management.
Which of the following is NOT a common error-handling technique used in the transport layer?
- Error Detection
- Flow Control
- Framing
- Retransmission
Framing is not typically considered a common error-handling technique in the transport layer. Error detection is used to identify and correct errors in transmitted data. Flow control helps manage the speed of data transmission, and retransmission handles the retransmission of lost or corrupted data.
Which protocol would be more suitable for streaming videos where occasional data loss is acceptable?
- HTTP (Hypertext Transfer Protocol)
- IP (Internet Protocol)
- TCP (Transmission Control Protocol)
- UDP (User Datagram Protocol)
UDP (User Datagram Protocol) is suitable for streaming videos where occasional data loss is acceptable. UDP is connectionless and does not guarantee data delivery, but it offers lower latency, making it ideal for real-time applications like video streaming.
What kind of message does the "ping" command primarily use to check the reachability of a network device?
- ARP Request
- ICMP Echo Request
- TCP SYN
- UDP Packet
The "ping" command primarily uses ICMP Echo Request messages to check the reachability of a network device. It sends these messages to the target device, which should respond with an ICMP Echo Reply if it's reachable.
A company wants to ensure that its internal servers are not directly accessible from the internet but can still initiate connections to external services. Which technology would best fit this requirement?
- Firewall
- VPN (Virtual Private Network)
- Proxy Server
- NAT (Network Address Translation)
In this scenario, the best technology to ensure that internal servers are not directly accessible from the internet while allowing them to initiate connections to external services is a Proxy Server. A Proxy Server acts as an intermediary, forwarding requests from internal clients to external services while masking the internal server's identity. It provides security and control over outgoing connections. Firewalls and VPNs are primarily used for different purposes, and NAT doesn't provide the necessary level of control.
The numerical labels assigned to specific processes running on a host to differentiate them are known as _________.
- IP Address
- MAC Address
- Port Numbers
- Subnet Mask
Port Numbers are numerical labels assigned to specific processes running on a host to differentiate them. These ports are used to direct network traffic to the appropriate applications or services running on a device.
Ethernet's evolution started with 10BASE-T, with the "10" indicating the speed of _______ Mbps.
- 1
- 10
- 100
- 1000
In 10BASE-T, the "10" signifies the network speed, which is 10 Mbps (Megabits per second). This was one of the early Ethernet standards using twisted-pair cables.