1/51
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the primary purpose of tunneling in networking?
A) To speed up data transmission
B) To provide encryption for data that normally isn’t encrypted
C) To replace all existing protocols
D) To compress large files
B — To provide encryption for data that normally isn’t encrypted
Why might rewriting existing programs to add encryption be impractical?
A) Encryption is unnecessary for most programs
B) Programs like VNC are already secure
C) There are too many unencrypted programs and protocols on the Internet
D) Encryption slows down the Internet too much
C — There are too many unencrypted programs and protocols on the Internet
How does SSH facilitate tunneling for programs like VNC?
A) SSH rewrites the VNC protocol entirely
B) SSH encrypts data from the program and sends it through an encrypted connection
C) SSH replaces the VNC client interface with its own
D) SSH compresses the VNC data to reduce bandwidth
B — SSH encrypts data from the program and sends it through an encrypted connection
In the tunneling example using PuTTY and VNC, what does PuTTY do differently than in a normal terminal session?
A) It runs without any encryption
B) It takes input directly from the VNC client instead of the keyboard
C) It connects directly to the VNC server without encryption
D) It blocks all outgoing connections
B — It takes input directly from the VNC client instead of the keyboard
Why is the term “tunnel” used in networking?
A) Because it involves creating a physical cable underground
B) Because applications communicate through an intermediary encrypted channel instead of directly
C) Because it only works with SSH programs
D) Because it blocks unauthorized users automatically
B — Because applications communicate through an intermediary encrypted channel instead of directly
Which of the following is a key advantage of using tunneling over rewriting applications for encryption?
A) It automatically upgrades all programs to proprietary protocols
B) It allows existing programs to be encrypted without modifying their original code
C) It eliminates the need for SSH
D) It increases the speed of all network applications
B — It allows existing programs to be encrypted without modifying their original code
What does DWDM (Dense Wavelength Division Multiplexing) enable in fiber networks?
A) Faster wireless signals over short distances
B) A single fiber to carry multiple signals using different wavelengths
C) Encryption of fiber-optic traffic
D) Conversion of fiber signals to copper
B — A single fiber to carry multiple signals using different wavelengths
What is the main difference between DWDM and CWDM?
A) DWDM uses multiple colors of light, CWDM uses a single color
B) CWDM supports longer distances than DWDM
C) DWDM supports more signals and is suitable for long-distance lines, while CWDM is simpler and limited to ~60 km
D) CWDM is more expensive than DWDM
Which private WAN technology uses labels to improve packet forwarding and prioritization?
A) SD-WAN
B) Metro Ethernet
C) MPLS
D) CWDM
C — MPLS
In MPLS, what is the purpose of the experimental bits in a packet label?
A) Indicate encryption type
B) Determine the importance of the packet for prioritization
C) Mark the packet as a test packet
D) Set the time-to-live value
B — Determine the importance of the packet for prioritization
What is a key advantage of SD-WAN over traditional MPLS networks?
A) SD-WAN requires dedicated leased lines for every location
B) SD-WAN combines features of MPLS while efficiently using the public internet
C) SD-WAN eliminates encryption for speed
D) SD-WAN only works within a city
B — SD-WAN combines features of MPLS while efficiently using the public
What is Metro Ethernet (Metro Optical) primarily used for?
A) Connecting WANs across multiple countries
B) Creating a secure private network within a city without using the internet
C) Encrypting MPLS traffic
D) Reducing fiber-optic signal distance
B — Creating a secure private network within a city without using the internet
What is the primary purpose of a Content Delivery Network (CDN)?
A) To provide dedicated private connections between offices
B) To distribute content from a location closer to the user for faster access
C) To encrypt all internet traffic for security purposes
D) To replace local area networks within an organization
B — To distribute content from a location closer to the user for faster access
How does a CDN typically achieve faster content delivery?
A) By using MPLS labels to prioritize traffic
B) By geographically distributing servers closer to users
C) By limiting access to only high-priority clients
D) By increasing the bandwidth of a single server
B — By geographically distributing servers closer to users
Which types of content can a CDN deliver efficiently?
A) Only text-based web pages
B) Programming graphics, videos, audio files, and web pages
C) Only secure encrypted emails
D) Only local network resources
B — Programming graphics, videos, audio files, and web pages
Which major companies are known to use CDNs for content delivery?
A) Amazon and Netflix
B) Small private LANs
C) Government-only intranets
D) Metro Ethernet providers
A — Amazon and Netflix
What is the main objective of Quality of Service (QoS) in a network?
A) To encrypt all network traffic for security
B) To set priorities for critical applications and data
C) To increase the number of connected devices
D) To reduce the number of routers in the network
B — To set priorities for critical applications and data
Which metrics are primarily used to measure QoS in a network?
A) Network reliability, latency, jitter, and bandwidth changes
B) Number of users, IP addresses, and MAC addresses
C) Router models, switch types, and firewall rules
D) DNS records, CDN nodes, and TTL values
A — Network reliability, latency, jitter, and bandwidth changes
How can QoS be improved or adjusted on a network?
A) By classifying packet types into different classes and queues
B) By installing more antivirus software
C) By disabling network flow metrics
D) By increasing TTL for all packets
A — By classifying packet types into different classes and queues
What does Time to Live (TTL) indicate in routing?
A) The priority level of a packet in a queue
B) The number of hops a packet can pass through before being dropped
C) The encryption strength of the packet
D) The DNS record's caching duration
B — The number of hops a packet can pass through before being dropped
How is TTL used differently in a CDN or DNS caching context?
A) It determines the number of users who can access content
B) It indicates how long content or DNS data is considered valid before fetching a fresh copy
C) It limits the number of routers in a path
D) It measures network jitter and latency
B — It indicates how long content or DNS data is considered valid before fetching a fresh copy
What is a key limitation of DSL technology in terms of distance?
A) It must be within 18,000 feet of a central office
B) It requires line-of-sight to a satellite
C) It only works underground
D) It has no distance limitations
A — It must be within 18,000 feet of a central office
How does satellite internet differ from DSL and cable in terms of speed?
A) Satellite is always faster than DSL and cable
B) Satellite speeds are generally slower, historically topping around 3 Mbps, but modern asynchronous satellites can achieve downloads of ~12 Mbps and uploads of ~3 Mbps
C) Satellite only supports upload speeds
D) Satellite provides unlimited speed regardless of distance
B — Satellite speeds are generally slower, historically topping around 3 Mbps, but modern asynchronous satellites can achieve downloads of ~12 Mbps and uploads of ~3 Mbps
What is the typical setup for a satellite internet connection?
A) Fiber optic cable directly to the computer
B) Satellite transmitter/receiver connected via RG-6 cables to a satellite modem, which then outputs to an RJ-45 connection
C) USB connection to the satellite
D) Direct wireless connection without any modem
B — Satellite transmitter/receiver connected via RG-6 cables to a satellite modem, which then outputs to an RJ-45 connection
What is satellite latency and why does it occur?
A) Delay in packet delivery due to encryption
B) Delay caused by the long distance a signal must travel to the satellite and back, even if speed is high
C) Delay due to network congestion
D) Delay caused by modem power settings
B — Delay caused by the long distance a signal must travel to the satellite and back, even if speed is high
Which type of connection output do DSL, cable, and satellite modems typically provide?
A) USB-C
B) RJ-45 Ethernet
C) HDMI
D) F-Type coaxial only
B — RJ-45 Ethernet
What is the purpose of the GSM standard in cellular technology?
A) It used spread spectrum to allow multiple users on different frequencies
B) It relied on time-division multiple access (TDMA) to allow multiple users to share the same channel
C) It enabled 5G speeds up to 1 Gbps
D) It introduced LTE nano SIM cards
B — It relied on time-division multiple access (TDMA) to allow multiple users to share the same channel
Which cellular technology is considered superior to GSM and uses spread spectrum transmission?
A) EDGE
B) LTE
C) CDMA
D) 5G
C — CDMA uses spread spectrum transmission and is considered superior to GSM
Card 3
What is a SIM card used for in GSM networks?
A) To provide faster download speeds
B) To identify a phone and give it access to a cellular network
C) To enable spread spectrum transmission
D) To change frequency bands automatically
B — To identify a phone and give it access to a cellular network
Which cellular technology introduced LTE and nano SIM cards, with download speeds up to 300 Mbps?
A) CDMA
B) EDGE
C) LTE
D) 5G
C — LTE introduced nano SIM cards and download speeds up to 300 Mbps
What are the three frequency bands used by 5G, and how do they affect performance?
A) Low, medium, high; higher frequency = slower speed at shorter range
B) Low, medium, high; higher frequency = faster speed at shorter range
C) 2G, 3G, 4G; higher generation = faster speed at shorter range
D) TDMA, CDMA, LTE; higher frequency = faster speed at longer range
B — 5G runs at low, medium, and high bands; higher frequency = faster speed at shorter range
Which company originally developed remote desktop technology using the Independent Computing Architecture (ICA) protocol?
A) Microsoft
B) Citrix
C) TightVNC
D) Linux
B — Citrix
What does VNC stand for, and what is its primary feature?
A) Virtual Network Computing; allows cross-platform remote access
B) Virtual Node Connection; only works on Windows
C) Verified Network Communication; proprietary protocol
D) Virtual Node Computing; Linux-only solution
A — Virtual Network Computing; allows cross-platform remote access
Which protocol is proprietary to Microsoft for remote desktop connections?
A) ICA
B) VNC
C) RDP
D) SSH
C — RDP (Remote Desktop Protocol)
What is the default port number used by Microsoft’s Remote Desktop Protocol (RDP)?
A) 5900
B) 3389
C) 8080
D) 22
B — 3389
What port does TightVNC typically use for remote desktop connections?
A) 3389
B) 21
C) 5900
D) 443
C — 5900
Which operating systems can you connect to using VNC or TightVNC?
A) Only Windows
B) Only Linux
C) Cross-platform: Windows, Mac, Linux
D) Only Mac
C — Cross-platform: Windows, Mac, Linux
What is the main purpose of a VPN (Virtual Private Network)?
A) To access remote desktop sessions only
B) To create a secure tunnel from a remote location to a private network
C) To increase internet speed
D) To replace a router
B — To create a secure tunnel from a remote location to a private network
Which VPN protocol is primarily associated with Microsoft and considered older?
A) PPTP
B) L2TP/IPSec
C) SSTP
D) IKEv2
A — PPTP (Point-to-Point Tunneling Protocol)
What does a VPN concentrator (VPN headend) do?
A) Encrypts all internet traffic from all users on the network
B) Acts as a dedicated endpoint for VPN connections
C) Monitors network bandwidth
D) Provides wireless access only
B — Acts as a dedicated endpoint for VPN connections
What is the difference between split tunneling and full tunneling in a VPN?
A) Split tunneling encrypts all traffic; full tunneling only encrypts specified traffic
B) Split tunneling sends only specified traffic over the VPN; full tunneling sends all traffic over the VPN
C) Split tunneling uses PPTP; full tunneling uses L2TP
D) There is no difference
B — Split tunneling sends only specified traffic over the VPN; full tunneling sends all traffic over the VPN
Which VPN protocol is known as SSL Tunneling Protocol and is widely used today for security?
A) PPTP
B) L2TP/IPSec
C) SSTP
D) IKEv2
C — SSTP (Secure Socket Tunneling Protocol)
What is the purpose of out-of-band (OOB) network management?
A) To manage a network directly through its normal traffic channels
B) To manage network devices via a separate, dedicated infrastructure even if the main network is down
C) To speed up VPN connections
D) To replace SSH and SNMP
B — To manage network devices via a separate, dedicated infrastructure even if the main network is down
Which VPN model connects two separate networks permanently so they function as one network?
A) Client-to-site VPN
B) Site-to-site VPN
C) Clientless VPN
D) Split tunneling VPN
B — Site-to-site VPN
What is the primary purpose of the Spanning Tree Protocol (STP) in a network?
A) To speed up packet delivery on a network
B) To prevent frames from endlessly looping on redundant links
C) To assign IP addresses to devices
D) To encrypt data between switches
B — To prevent frames from endlessly looping on redundant links
How is the root bridge selected in STP when switches have the same priority?
A) The switch with the highest IP address wins
B) The switch with the lowest MAC address wins
C) The switch with the most connected devices wins
D) The switch with the oldest firmware wins
B — The switch with the lowest MAC address wins
Which STP port state forwards frames and maintains MAC address tables?
A) Blocking
B) Listening
C) Learning
D) Forwarding
D — Forwarding
What does “flapping” mean in STP networks?
A) Ports randomly shutting down due to admin errors
B) Ports continuously switching between blocking and forwarding states
C) Switches losing power intermittently
D) VLAN IDs being assigned incorrectly
B — Ports continuously switching between blocking and forwarding states
What is a common result of VLAN misconfiguration on a switch port?
A) Devices may experience reduced bandwidth but remain connected
B) Devices may end up on the wrong VLAN, causing connectivity and potential security issues
C) The switch will automatically correct the VLAN ID
D) Only the root bridge is affected
B — Devices may end up on the wrong VLAN, causing connectivity and potential security issues
What happens when two devices on the same IPv4 network have the same IP address?
A) The network automatically resolves the conflict
B) Only one device can communicate with the default gateway
C) Communication may connect to the wrong device depending on the last ARP response
D) Both devices will stop functioning immediately
C — Communication may connect to the wrong device depending on the last ARP response
What occurs when a DHCP server’s address pool runs out?
A) Devices are automatically assigned static IP addresses
B) Devices assign themselves an APIPA address and can only communicate locally
C) Devices stop functioning entirely
D) Devices randomly share the last assigned IP address
B — Devices assign themselves an APIPA address and can only communicate locally
Which configurations on a DHCP server commonly cause network connectivity problems?
A) Incorrect VLAN IDs and port speeds
B) Wrong default gateway and subnet mask addresses
C) Firewall rules on the DHCP server
D) Duplicate MAC addresses
B — Wrong default gateway and subnet mask addresses