Which layer of the OSI model is responsible for determining the best path for data to travel across multiple networks?
A Application
B Network
C Data Link
D Transport
The Network layer (Layer 3) is responsible for routing data across networks. It determines the best path for data transmission using logical addressing (e.g., IP addresses) and handles packet forwarding.
Which protocol is primarily used to transfer files over the internet?
A FTP
B DNS
C SMTP
D DHCP
FTP (File Transfer Protocol) is used to transfer files between computers over a TCP/IP network, allowing users to upload or download files from servers efficiently.
Which of the following devices operates at Layer 2 of the OSI model and is used to forward data between devices on the same network?
A Router
B Hub
C Modem
D Switch
A switch operates at Layer 2 (Data Link) of the OSI model and is used to forward data frames between devices within the same network. It uses MAC addresses to make forwarding decisions.
Which protocol is used to convert a hostname (e.g., www.example.com) into an IP address?
A SMTP
B FTP
C DNS
D HTTP
DNS (Domain Name System) is used to resolve domain names into IP addresses, allowing users to access websites using human readable names instead of numeric IP addresses.
What type of network is designed to span a city or a large campus, typically connecting multiple buildings?
A MAN
B PAN
C LAN
D WAN
A Metropolitan Area Network (MAN) spans a city or large campus. It connects multiple LANs within a geographical area, offering high speed communication over larger distances than LANs.
Which technology allows for communication between devices in a personal area network (PAN)?
A 5G
B Ethernet
C Bluetooth
D Wi Fi
Bluetooth enables wireless communication between devices over short distances, typically within a range of 100 meters, making it ideal for personal area networks (PANs).
Which of the following is used to establish a secure communication channel between a remote user and a network over the internet?
A TCP
B DNS
C HTTP
D VPN
A Virtual Private Network (VPN) securely connects a remote user to a private network over the internet, encrypting the data to protect it from unauthorized access.
Which protocol ensures the reliable transmission of data by managing the flow of packets between devices on a network?
A TCP
B IP
C UDP
D SMTP
TCP (Transmission Control Protocol) ensures reliable data transmission by establishing a connection between devices, managing packet order, error checking, and retransmitting lost packets.
Which layer of the OSI model is responsible for managing data flow control and error recovery?
A Session
B Application
C Transport
D Network
The Transport layer (Layer 4) is responsible for managing data flow control, error recovery, and ensuring the reliable delivery of data between two devices over a network.
Which type of network provides wireless internet access to devices within a limited range, typically within a building?
A LAN
B Wi Fi
C 4G
D Bluetooth
Wi Fi is a wireless networking technology that provides internet access within a limited range, such as in homes, offices, and public spaces. It operates using radio waves to connect devices to a network.
Which network device is responsible for connecting devices within a local network and forwarding data based on MAC addresses?
A Router
B Gateway
C Switch
D Hub
A switch forwards data frames between devices in the same network using MAC addresses. It operates at Layer 2 of the OSI model and is more efficient than a hub, which broadcasts data to all devices.
What is the main function of the Data Link layer in the OSI model?
A Flow control
B Addressing
C Error correction
D Routing
The Data Link layer (Layer 2) is responsible for error detection and correction in data frames. It ensures reliable communication between devices on the same network by checking for errors in transmission.
Which of the following protocols is responsible for sending email messages between servers?
A SMTP
B FTP
C HTTP
D DHCP
SMTP (Simple Mail Transfer Protocol) is used to send email messages between servers. It ensures that email messages are directed to the correct mail server for delivery to recipients.
Which network topology is designed in a way that each device is connected to every other device, ensuring redundancy and fault tolerance?
A Star
B Ring
C Mesh
D Bus
In a Mesh topology, every device is directly connected to every other device in the network. This design provides redundancy and fault tolerance, ensuring the network remains operational even if one connection fails.
Which protocol is commonly used for securing websites and ensuring encrypted data exchange between a browser and a server?
A HTTP
B SSL/TLS
C FTP
D TCP
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are protocols used to encrypt data exchanged between a browser and a server, ensuring that sensitive information, like login credentials and payment details, is secure.