1. VPN is abbreviated as __________
a) Visual Private Network
b) Virtual Protocol Network
c) Virtual Private Network
d) Virtual Protocol Networking
Answer: c
Explanation: A Virtual Private Network i.e. VPN is a technique used in
networking or other intermediate networks for connecting computers and making
them isolated remote computer networks, maintaining a tunnel of security and
privacy.
2. __________ provides an isolated tunnel across a
public network for sending and receiving data privately as if the computing
devices were directly connected to the private network.
a) Visual Private Network
b) Virtual Protocol Network
c) Virtual Protocol Networking
d) Virtual Private Network
Answer: d
Explanation: A Virtual Private Network i.e. VPN is a technique used in
networking or other intermediate networks for connecting computers and making
them isolated remote computer networks, maintaining a tunnel of security and
privacy.
3. Which of the statements are not true to classify
VPN systems?
a) Protocols used for tunnelling the traffic
b) Whether VPNs are providing site-to-site or remote access connection
c) Securing the network from bots and malwares
d) Levels of security provided for sending and receiving data privately
Answer: c
Explanation: VPN systems have specific protocols for tunnelling the
traffic, secure remote access connectivity as well as make sure how many levels
of security it is providing for private data communication.
4. What types of protocols are used in VPNs?
a) Application level protocols
b) Tunnelling protocols
c) Network protocols
d) Mailing protocols
Answer: a
Explanation: All VPNs are formed with a combination of tunnelling protocols
as well as encryption techniques for maintaining privacy and security.
5. VPNs uses encryption techniques to maintain
security and privacy which communicating remotely via public network.
a) True
b) False
Answer: a
Explanation: All VPNs are formed with a combination of tunnelling protocols
as well as encryption techniques for maintaining privacy and security.
6. There are _________ types of VPNs.
a) 3
b) 2
c) 5
d) 4
Answer: b
Explanation: VPNs are of two types. These are remote access VPNs & Site-to-site
VPNs. Remote Access VPNs are used for business & home users. Site-to-site
VPNs are mainly used in companies and firms with different geographical
locations.
7. Site-to-site VPNs are also known as ________
a) Switch-to-switch VPNs
b) Peer-to-Peer VPNs
c) Point-to-point VPNs
d) Router-to-router VPNs
Answer: d
Explanation: Site-to-site VPNs are also known as Router-to-router VPNs.
They are mainly used in companies and firms with different geographical
locations.
8. _________ type of VPNs are used for home private
and secure connectivity.
a) Remote access VPNs
b) Site-to-site VPNs
c) Peer-to-Peer VPNs
d) Router-to-router VPNs
Answer: a
Explanation: Remote access VPN allows individual users to connect to
private networks at home and access resources remotely.
9. Which types of VPNs are used for corporate
connectivity across companies residing in different geographical location?
a) Remote access VPNs
b) Site-to-site VPNs
c) Peer-to-Peer VPNs
d) Country-to-country VPNs
Answer: b
Explanation: Site-to-site VPNs are also known as Router-to-router VPNs
which are typically used in companies and firms for connecting remotely
different branches with different geographical locations.
10. Site-to-Site VPN architecture is also known as
_________
a) Remote connection based VPNs
b) Peer-to-Peer VPNs
c) Extranet based VPN
d) Country-to-country VPNs
Answer: c
Explanation: Site-to-site VPN architecture is also known as extranet based
VPNs because these type of VPNs are typically used to connect firms externally between
different branches of the same company.
11. There are ________ types of VPN protocols.
a) 3
b) 4
c) 5
d) 6
Answer: d
Explanation: There are six types of protocols used in VPN. These are
Internet Protocol Security or IPSec, Layer 2 Tunnelling Protocol (L2TP), Point
– to – Point Tunnelling Protocol (PPTP), Secure Sockets Layer (SSL), OpenVPN
and Secure Shell (SSH).
12. For secure connection, Remote access VPNs rely on
___________ and ____________
a) IPSec, SSL
b) L2TP, SSL
c) IPSec, SSH
d) SSH, SSL
Answer: a
Explanation: A remote-access VPN typically depends on either Secure Sockets
Layer (SSL) or IP Security (IPsec) for a secure connection over public network.
13. A ______ can hide a user’s browsing activity.
a) Firewall
b) Antivirus
c) Incognito mode
d) VPN
Answer: d
Explanation: VPNs are used for hiding user’s browsing activities and
maintain anonymity. This also helps in preventing user’s personal browsing data
leakage and protects the leakage of browsing habits.
14. __________ masks your IP address.
a) Firewall
b) Antivirus
c) VPN
d) Incognito mode
Answer: c
Explanation: VPNs are used for masking user’s IP address and maintain
anonymity. This protects leakage of IP address that almost every website grabs
when a user opens a website.
15. _________ are also used for hides user’s physical
location.
a) Firewall
b) Antivirus
c) Incognito mode
d) VPN
Answer: d
Explanation: VPNs are used for hiding your physical location which helps in
maintaining anonymity. Using IP address and browsing habits, link search, your
physical location can be traced.
16. Using VPN, we can access _______________
a) Access sites that are blocked geographically
b) Compromise other’s system remotely
c) Hide our personal data in the cloud
d) Encrypts our local drive files while transferring
Answer: a
Explanation: With the help of VPN, users can access and connect to sites
that are kept blocked by the ISPs based on a specific geographic location.
17. Your router has the following IP address on
Ethernet0: 172.16.2.1/23. Which of the following can be valid host IDs on the
LAN interface attached to the router?
i. 172.16.1.100
ii. 172.16.1.198
iii. 172.16.2.255
iv. 172.16.3.0
a) i only
b) ii and iii only
c) iii and iv only
d) ii only
Answer: c
Explanation: The router’s IP address on the E0 interface is 172.16.2.1/23,
which is 255.255.254.0. This makes the third octet a block size of 2. The
router’s interface is in the 172.16.2.0 subnet, and the broadcast address is
172.16.3.255 because the next subnet is 172.16.4.0. The valid host range is
172.16.2.1 to 172.16.3.254. The router is using the first valid host address in
the range.
18. Which two statements describe the IP address
10.16.3.65/23?
i. The subnet address is 10.16.3.0 255.255.254.0.
ii. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
iii. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
iv. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
a) i and iii
b) ii and iv
c) i, ii and iv
d) ii, iii and iv
Answer: b
Explanation: The mask 255.255.254.0 (/23) used with a Class A address means
that there are 15 subnet bits and 9 host bits. The block size in the third
octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0,
2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 10.16.2.0
subnet. The next subnet is 10.16.4.0, so the broadcast address for the
10.16.2.0 subnet is 10.16.3.255. The valid host addresses are 10.16.2.1 to
10.16.3.254.
19. What is the maximum number of IP addresses that
can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet
mask?
a) 14
b) 15
c) 16
d) 30
Answer: d
Explanation: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This
provides 8 subnets, each with 30 hosts. Does it matter if this mask is used
with a Class A, B, or C network address? Not at all. The number of host bits
would never change.
20. You need to subnet a network into 5 subnets, each
with at least 16 hosts. Which classful subnet mask would you use?
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248
Answer: b
Explanation: You need 5 subnets, each with at least 16 hosts. The mask
255.255.255.240 provides 16 subnets with 14 hosts which is less than 15, so
this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30
hosts so this may work. The mask 255.255.255.192 provides 4 subnets, each with
60 hosts so this may work. Comparing both the possible masks, 255.255.255.224
provides the best answer.
21. If an Ethernet port on a router were assigned an IP
address of 172.16.112.1/25, what would be the valid subnet address of this
host?
a) 172.16.112.0
b) 172.16.0.0
c) 172.16.96.0
d) 172.16.255.0
Answer: a
Explanation: A /25 mask is 255.255.255.128. Used with a Class B network,
the third and fourth octets are used for subnetting with a total of 9 subnet
bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is
only 1 bit in the fourth octet, the bit is either off or on-which is a value of
0 or 128. The host in the question is in the 0 subnet, which has a broadcast
address of 127 since 128 is the next subnet
22. You have an interface on a router with the IP
address of 192.168.192.10/29. Including the router interface, how many hosts
can have IP addresses on the LAN attached to the router interface?
a) 6
b) 8
c) 30
d) 32
Answer: a
Explanation: A /29 (255.255.255.248), regardless of the class of address,
has only 3 host bits. Six hosts are the maximum number of hosts on this LAN,
including the router interface. Out of the 8 addresses possible with the host
bits, the first and the last address are for the subnet id and broadcast
address respectively.
23. What is the subnet id of a host with an IP address
172.16.66.0/21?
a) 172.16.36.0
b) 172.16.48.0
c) 172.16.64.0
d) 172.16.0.0
Answer: c
Explanation: A /21 is 255.255.248.0, which means we have a block size of 8
in the third octet, so we just count by 8 until we reach 66. The subnet in this
question is 64.0. The next subnet is 72.0, so the broadcast address of the 64
subnet is 71.255.
24. The network address of 172.16.0.0/19 provides how
many subnets and hosts?
a) 7 subnets, 30 hosts each
b) 8 subnets, 8,190 hosts each
c) 8 subnets, 2,046 hosts each
d) 7 subnets, 2,046 hosts each
Answer: b
Explanation: A CIDR address of /19 is 255.255.224.0. This is a Class B
address, so that is only 3 subnet bits, but it provides 13 host bits, or 8
subnets, each with 8,190 hosts.
25. Which of the following is the broadcast address
for a Class B network ID using the default subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
Answer: c
Explanation: In this case, the class B network ID is 172.16.0.0. We know that
the default mask of a class B network is 255.255.0.0. If we OR any address
in a network with the complement of the default mask (0.0.255.255), we get the
broadcast address of the network. In this case, the result of OR would be
172.16.255.255.
26. You have an IP address of 172.16.13.5 with a
255.255.255.128 subnet mask. What is your class of
address, subnet address, and broadcast address?
a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
Answer: b
Explanation: We know that the prefix 172 lies in class B (128 to 191) of
IPv4 addresses. From the subnet mask, we get that the class is divided into 2
subnets: 172.16.13.0 to 172.16.13.127 and 172.16.13.128 to 172.16.13.255. The IP
172.16.13.5 lies in the first subnet. So the starting address 172.16.13.0 is
the subnet address and last address 172.16.13.127 is the broadcast address.
27. If you wanted to have 12 subnets with a Class C
network ID, which subnet mask would you use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
Answer: c
Explanation: If you have eight networks and each requires 10 hosts, you
would use the Class C mask of 255.255.255.240. Why? Because 240 in binary is
11110000, which means you have four subnet bits and four host bits. Using our
math, we’d get the following:
24-2=14 subnets
24-2=14 hosts.
28. The combination of _________ and __________ is
often termed the local address of the local portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number
Answer: c
Explanation: It is termed as the local address because the address won’t be
applicable outside the subnet. Sub networking is implemented for remote sensing
in transparent way from that host which is contained in the sub network which
called a local operation.
29. _________ implies that all subnets obtained from
the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Dynamic length subnetting
Answer: a
Explanation: Static subnetting is used when the requirement is of same
number of hosts in each subnet for the institution. The same subnet mask can be
used to find the subnet id of each subnet. It is usually used to divide large
networks into smaller parts.
30. State whether true or false.
i) A connection oriented protocol can only use unicast addresses.
ii) The any cast service is included in IPV6.
a) True, True
b) True, False
c) False, True
d) False, False
Answer: a
Explanation: In a connection oriented protocol, the host can only establish
connection with another host on one unique channel, that’s why it can only use
unicast addresses. In IPv6, there is an anycast address in IPv6 which allows
sending messages to a group of devices but not all devices in a network.
31. __________ is a high performance fiber optic token
ring LAN running at 100 Mbps over distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
Answer: a
Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set
of standards for fiber optic token ring LANs running at 100 Mbps over distances
up to 200 km in diameter and 1000 stations connected.
32. Which of the following are Gigabit Ethernets?
a) 1000 BASE-SX
b) 1000 BASE-LX
c) 1000 BASE-CX
d) All of the mentioned
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a
term describing various technologies for transmitting Ethernet frames at a rate
of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE
802.3-2008 standard. It came into use beginning in 1999, gradually supplanting
Fast Ethernet in wired local networks, as a result of being considerably
faster.
33. _________ is a collective term for a number of
Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s
against the original Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) Gigabyte Ethernet
Answer: b
Explanation: Fast Ethernet is a set of Ethernet Standards which were
introduced in 1995, that carry traffic at the nominal rate of 1000 Mbit/s.
100BASE-TX is the most commonly used Fast Ethernet standard.
34. _________ is another kind of fibre optic network
with an active star for switching.
a) S/NET
b) SW/NET
c) NET/SW
d) FS/NET
Answer: a
Explanation: A 50-MBd active star fiber optical Local area network (LAN)
and its optical combiner and mixing rod splitter are presented. The limited
power budget and relatively large tapping losses of light wave technology, which
limit the use of fiber optics in tapped bus LAN topologies, are examined and
proven tolerable in optical star topologies.
0 Comments