Which layer of the OSI model is responsible for establishing, managing, and terminating communication sessions?
A Data Link
B Transport
C Session
D Network
The Session layer in the OSI model manages sessions between computers. It ensures that data is properly synchronized and maintains the session until communication is terminated, establishing and terminating connections between applications.
Which protocol is used to translate domain names into IP addresses?
A DNS
B FTP
C DHCP
D HTTP
DNS (Domain Name System) translates human-readable domain names like www.example.com into machine‐readable IP addresses, allowing users to access websites by using domain names instead of IP addresses.
What type of network topology connects all devices to a central point?
A Ring
B Mesh
C Bus
D Star
In a star topology, all devices are connected to a central hub or switch. This setup makes troubleshooting easier because issues are usually isolated to individual connections, unlike in bus or ring topologies.
Which of the following is a private IP address range?
A 192.0.0.1
B 10.0.0.0 to 10.255.255.255
C 8.8.8.8
D 172.16.0.0 to 172.31.255.255
The range 10.0.0.0 to 10.255.255.255 is part of the private IP address space defined by the RFC 1918. These IP addresses are used within local networks and are not routable over the internet.
Which network device is used to forward data between different networks?
A Hub
B Modem
C Router
D Switch
A router connects different networks and directs data packets between them. It uses IP addresses to determine the best path for data transmission, unlike switches or hubs, which operate within a single network.
Which of the following is a protocol for secure communication over the internet?
A HTTPS
B SMTP
C TCP
D FTP
HTTPS (HyperText Transfer Protocol Secure) is a protocol that ensures secure communication over the internet by encrypting data between the client and server, using SSL/TLS encryption.
What is the primary function of the TCP/IP model’s Internet layer?
A Flow control
B Error handling
C Routing
D Encryption
The Internet layer of the TCP/IP model is responsible for routing packets across multiple networks. It uses IP addresses to determine the destination and path of the data packet.
Which technology allows for the creation of private networks over public networks?
A SNMP
B NAT
C DNS
D VPN
A Virtual Private Network (VPN) creates a secure, encrypted connection over a public network, such as the internet, allowing remote users or sites to access private networks safely.
Which is a primary function of NAT (Network Address Translation)?
A Routing data packets
B Encrypting traffic
C Translating private IP addresses to public
D Compressing data
NAT translates private IP addresses within a local network to a public IP address. This allows multiple devices within a network to share a single public IP address when accessing the internet.
Which of the following is an example of a wireless communication technology?
A 5G
B Wi Fi
C Fibre optic
D Ethernet
Wi Fi is a wireless communication technology that allows devices to connect to the internet or local networks without the need for physical cables, commonly used in homes and offices.
What is the purpose of a firewall in network security?
A Block unauthorized access
B Encrypt packets
C Compress data
D Speed up the network
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps block unauthorized access to the network.
Which network protocol assigns IP addresses to devices automatically?
A FTP
B DNS
C DHCP
D HTTP
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network, eliminating the need for manual configuration of each device’s IP address.
Which type of network is designed for a large geographical area, such as a city or a country?
A MAN
B PAN
C LAN
D WAN
A Wide Area Network (WAN) spans a large geographical area, such as between cities or countries, and is typically used by businesses to connect multiple locations over long distances.
What is the role of MAC addresses in network communication?
A Encrypting data
B Identifying devices at Layer 2
C Routing packets across networks
D Assigning IP addresses
A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communications at the Data Link Layer (Layer 2) of the OSI model. It is used to ensure that data packets reach the correct device within a local network.
Which of the following is a feature of Cloud Networking?
A Centralized data storage
B Limited scalability
C Physical hardware dependency
D Localized data transmission
Cloud networking allows for centralized data storage and management over the internet. It enables users to access data and applications remotely, and it offers scalability, flexibility, and efficient resource usage.