Which of the following layers of the OSI model is responsible for error detection and correction in data transmission?
A Session
B Network
C Data Link
D Transport
The Data Link layer (Layer 2) in the OSI model handles error detection and correction. It ensures that data frames are transmitted correctly between devices on the same network by checking for errors in transmitted data.
Which protocol is responsible for assigning dynamic IP addresses to devices on a network?
A DHCP
B DNS
C FTP
D HTTP
DHCP (Dynamic Host Configuration Protocol) assigns dynamic IP addresses to devices on a network. This ensures that devices receive the correct IP addresses automatically when they join the network, simplifying network management.
In which type of network topology do all devices connect to a single central device, creating a hub-and-spoke design?
A Mesh
B Bus
C Ring
D Star
In a star topology, all devices are connected to a central hub or switch. This configuration ensures efficient communication and simplifies troubleshooting since issues are isolated to individual devices or connections.
What is the main advantage of using IPv6 over IPv4 in networking?
A Better security
B Faster speeds
C Larger address space
D Simpler routing
IPv6 offers a significantly larger address space compared to IPv4, allowing for an almost infinite number of unique IP addresses. This is essential for supporting the growing number of connected devices worldwide.
What type of network is typically used for connecting devices within a home or small office?
A MAN
B LAN
C PAN
D WAN
A Local Area Network (LAN) connects devices within a small geographical area like a home or office. It typically involves devices such as computers, printers, and routers, facilitating resource sharing and communication.
Which protocol is used for securely transmitting data over the internet, ensuring confidentiality and integrity?
A SSL/TLS
B HTTP
C DNS
D FTP
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are protocols that encrypt data transmitted over the internet. They ensure the confidentiality and integrity of data by securing communications between web servers and clients.
What is the primary function of a router in a network?
A Encrypting data
B Filtering packets
C Forwarding packets
D Assigning IP addresses
A routerโs primary function is to forward data packets between networks. It examines IP addresses in the packet headers to determine the best path for data to travel across different networks.
Which of the following technologies allows devices to communicate wirelessly within short ranges?
A Ethernet
B Wi Fi
C 4G
D Bluetooth
Bluetooth technology enables devices to communicate wirelessly over short distances, typically up to 100 meters. It is commonly used for connecting peripherals like keyboards, mice, and headphones to computers and mobile devices.
Which network security mechanism is used to protect a network from unauthorized external access?
A NAT
B Firewall
C VPN
D Proxy
A firewall is a network security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and untrusted external networks, blocking unauthorized access.
What is the primary difference between circuit switched and packet switched networks?
A Connection method
B Cost
C Speed
D Protocol
In circuit switched networks, a dedicated communication path is established for the duration of the conversation. In packet switched networks, data is divided into packets and sent through various routes, optimizing resource use and efficiency.
Which of the following is a typical function of DNS in computer networks?
A Managing IP address allocation
B Monitoring network traffic
C Resolving domain names to IP addresses
D Encrypting data
DNS (Domain Name System) resolves human readable domain names, like www.example.com, into machine readable IP addresses, allowing devices to locate and communicate with websites and services on the internet.
Which of the following is a method used to improve network security by assigning virtual private networks over public infrastructure?
A DNS
B VPN
C DHCP
D NAT
A Virtual Private Network (VPN) creates a secure, encrypted tunnel over a public network, enabling users to connect securely to a private network and protect sensitive data during transmission over the internet.
Which type of network connects devices in a large geographical area, such as multiple cities or countries?
A LAN
B PAN
C WAN
D MAN
A Wide Area Network (WAN) connects devices and networks across large geographical areas, such as different cities or countries. The internet itself is an example of a WAN, linking networks worldwide.
What technology is used to provide wireless internet connectivity over long distances?
A Bluetooth
B Ethernet
C Wi Fi
D 5G
5G technology provides high speed wireless internet connectivity over long distances. It offers faster data speeds, lower latency, and increased capacity compared to earlier generations like 4G.
Which network device is responsible for creating a wireless network and connecting it to a wired network?
A Access Point
B Router
C Hub
D Switch
An Access Point (AP) is a device that allows wireless devices to connect to a wired network. It creates a Wi Fi network and acts as a bridge between the wireless network and the wired LAN.