Which technology is used to securely connect remote users to a private network over the internet?
A VPN
B Proxy
C DNS
D NAT
A Virtual Private Network (VPN) creates a secure connection between a remote user and a private network over the internet. It encrypts data, ensuring confidentiality and preventing unauthorized access to sensitive information.
Which of the following is a main function of a firewall in a network?
A Route data
B Encrypt data
C Block unauthorized access
D Assign IP addresses
A firewall monitors and filters network traffic based on security rules, blocking unauthorized access and allowing legitimate communication. It serves as a protective barrier between internal networks and external threats.
Which of the following is typically used to allow multiple devices to share a single public IP address when accessing the internet?
A DHCP
B NAT
C VPN
D DNS
Network Address Translation (NAT) enables multiple devices within a local network to share a single public IP address when accessing external resources like the internet. This helps conserve the limited number of available public IPs.
What is the primary purpose of Wi Fi in computer networking?
A Network routing
B Error checking
C Data encryption
D Wireless connectivity
Wi Fi enables devices to connect to a network wirelessly, using radio waves to transmit data. It is commonly used for providing internet access in homes, offices, and public spaces without the need for physical cables.
Which of the following is an example of a technology used in cellular networks for high speed internet access?
A 4G
B Wi Fi
C Ethernet
D Bluetooth
4G is a mobile communication technology that provides high speed internet access over cellular networks. It offers faster download and upload speeds compared to previous generations like 3G, enabling smooth data intensive applications.
Which type of IP address is typically used within private networks and is not routable on the public internet?
A Dynamic IP
B Static IP
C Private IP
D Public IP
Private IP addresses are used within internal networks, such as homes or businesses. They are not routed over the public internet and help conserve global IP address space. NAT is typically used to connect private networks to the internet.
Which of the following is a primary function of a VPN (Virtual Private Network)?
A Monitor traffic
B Encrypt communication
C Speed up the network
D Compress data
A VPN encrypts data transmitted between devices and networks, ensuring that sensitive information remains private and secure when traveling over public networks like the internet, preventing unauthorized access.
Which protocol is used to secure HTTP connections, providing encrypted data transfer between a browser and a web server?
A SSL/TLS
B DHCP
C DNS
D FTP
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols used to secure HTTP connections, ensuring that data exchanged between web servers and browsers is encrypted and protected from eavesdropping.
Which of the following is a characteristic of NAT (Network Address Translation)?
A Provides encryption
B Assigns IP addresses
C Increases network traffic
D Hides internal IP addresses
NAT hides internal IP addresses from the outside world by mapping them to a single public IP address. This allows devices on a private network to communicate with external networks without exposing their internal IPs.
Which network device is primarily used to create wireless local area networks (WLANs)?
A Router
B Hub
C Access Point
D Switch
An Access Point (AP) is used to create and manage wireless local area networks (WLANs). It allows wireless devices to connect to a wired network, providing internet access and local network communication without physical cables.
Which of the following protocols is primarily used for mapping domain names to IP addresses?
A HTTP
B DNS
C SMTP
D FTP
The Domain Name System (DNS) is responsible for mapping human readable domain names (like www.example.com) to machine readable IP addresses. This allows users to access websites using easy to remember names instead of numerical IP addresses.
Which of the following wireless communication technologies is designed for short range, low power communication between devices?
A 4G
B Ethernet
C Bluetooth
D Wi Fi
Bluetooth is designed for short range communication between devices, typically up to 100 meters. It is commonly used for connecting peripherals like headsets, keyboards, and speakers to devices like smartphones and laptops.
Which of the following is the primary function of a firewall in computer networking?
A Encrypt communication
B Detect viruses
C Route data packets
D Filter network traffic
A firewall filters network traffic, blocking or allowing packets based on predefined security rules. It protects internal networks from unauthorized access, malicious attacks, and other security threats.
What does the term “packet switching” refer to in computer networks?
A Dividing data into smaller units
B Determining the best route
C Encrypting data
D Sending packets in sequence
Packet switching is a method of transmitting data by breaking it into smaller packets. Each packet may take a different route to the destination, where the packets are reassembled in the correct order.
Which of the following is a common method used to provide wireless communication in large areas, such as cities or campuses?
A 5G
B Wi Fi
C WiMax
D Bluetooth
WiMax (Worldwide Interoperability for Microwave Access) is a wireless communication technology used to provide high speed internet access over long distances. It is commonly used in large geographical areas like cities or campuses.