Is Math Easier?
Black Mirror
Liam Neeson
Morgan Sexy Voice Freeman
Keanu Reeves
100

How does a Virtual LAN (VLAN) improve network performance and security?

A. By replacing the need for firewalls and other security measures in a network

B. By reducing the size of broadcast domains and isolating traffic between groups of devices

C. By automatically assigning IP addresses to devices in the network

D. By physically separating devices into different networks to prevent unauthorized access

Correct answer > (B)  By reducing the size of broadcast domains and isolating traffic between groups of devices.

VLANs logically segment a network into smaller broadcast domains. This reduces unnecessary traffic and isolates communication between groups of devices, improving both performance and security.

VLANs do not handle IP address assignment. That function is typically performed by a DHCP server. VLANs focus on logical segmentation and traffic isolation, not IP management.

VLANs do not involve physical separation. They achieve logical separation, allowing devices on the same physical switch to be grouped into different logical networks.

VLANs do not replace firewalls or other security measures. While VLANs enhance security by isolating traffic, they are not a substitute for comprehensive network security tools like firewalls.

100

What is the primary function of the Link or Network Interface layer in the TCP/IP model?

A.To put frames onto the physical network.

B. To manage multiple connections for different application layer protocols.

C. To provide packet addressing and routing within a network of networks.

D. To perform high-level functions like web and email services.

Correct answer > (A) To put frames onto the physical network.

The Link or Network Interface layer is responsible for placing frames onto the physical network. It operates at the local network segment level and handles the encapsulation of data into frames for transmission over Ethernet, Wi-Fi, or other local networking media.

The Internet layer is responsible for addressing and routing packets between different networks, which is beyond the scope of the Link layer's local network operations.

The Transport layer ensures that multiple connections for different application protocols can operate simultaneously. It is unrelated to the Link layer's role in handling frames on the physical network.

The Application layer deals with high-level protocols and services such as HTTP for web browsing and SMTP for email. The Link layer does not handle these types of functions.

100

You are troubleshooting a network issue where users are unable to access a company's email service.

After verifying that the network connection is stable and the IP addressing is correctly configured, you suspect the problem lies with the Application Layer.

Which of the following is the MOST likely cause of the issue?

A. The MAC address of the email server is not resolving correctly.

B. The email server's application protocol is not functioning properly.

C. The router is not forwarding packets to the correct destination.

D. The DHCP server is not assigning IP addresses to the clients.

Correct answer > (B) The email server's application protocol is not functioning properly.

The Application Layer is responsible for high-level network functions, including the operation of services like email. If users cannot access the email service, it is likely that the application protocol (e.g., SMTP, IMAP, or POP3) used by the email server is not functioning correctly.

That the router is not forwarding packets to the correct destination would relate to the Internet Layer, which handles packet routing and addressing. Since the question specifies that the network connection is stable and IP addressing is correct, this is unlikely to be the cause.

DHCP operates at the Application Layer, but the question states that IP addressing is correctly configured. Therefore, this is not the likely cause of the issue.

Resolving MAC addresses is a function of the Link Layer, specifically through the Address Resolution Protocol (ARP). This is unrelated to the Application Layer issue described in the scenario.

100

Which protocol is used to send email messages from a mail client to a mail server?

A. POP3

B. SNMP

C. IMAP

D. FTP

E. SMTP

Correct answer > (E) SMTP

SMTP sends email from a mail client to a mail server.

FTP provides a generic method for transferring files.

SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.

POP3 and IMAP are email protocols used by mail clients to retrieve email from a mail server. However, they can't be used to send mail from the client to the server.

100

What is the primary function of a load balancer in a network?

A. To filter out spam messages before they reach the user's inbox

B. To block unauthorized access to a network by using a firewall

C. To distribute client requests across server nodes in a farm or pool

D. To detect and prevent malicious traffic patterns using an intrusion detection system

Correct answer > (C) To distribute client requests across server nodes in a farm or pool.

The primary function of a load balancer is to distribute client requests across multiple server nodes in a farm or pool. This helps in providing high availability and scalability for services. C) To detect and prevent malicious traffic patterns using an intrusion detection system.

Blocking unauthorized access is the primary function of a firewall, not a load balancer. Firewalls are used to allow or block traffic based on network access control lists.

Detecting and preventing malicious traffic patterns is the function of an intrusion detection system (IDS) or intrusion prevention system (IPS), not a load balancer.

Filtering out spam messages is the function of a spam gateway, not a load balancer. Spam gateways are used to verify the authenticity of mail servers and filter unwanted messages.

200

You recently purchased a digital HD antenna to connect to your television.

Which of the following is the type of coaxial cable connector you need to make the connection?

A. EMI

B. F-type

C. BNC

D. UTP

Correct answer > (B) F-Type

Coaxial cable uses different types of connectors. The most common connector (and the one you're probably familiar with) is the F-type connector, which is used to connect a digital HD antenna to your television.

A BNC connector is used by very old networks and some specialized industries.

EMI (electromagnetic interference) is produced when an electrical current passes through any kind of copper wire.

UTP stands for unshielded twisted pair, which is a cheap form of wiring that does not protect against EMI.

200

What is the primary purpose of a DHCP server in a network?

A. To resolve domain names into IP addresses for devices on the network

B. To allocate IP addresses dynamically to devices on the network

C. To manually assign static IP addresses to all devices on the network

D. To act as a firewall and block unauthorized access to the network

Correct answer > (B) To allocate IP addresses dynamically to devices on the network.

The primary purpose of a DHCP (Dynamic Host Configuration Protocol) server is to dynamically assign IP addresses, subnet masks, and other configuration settings (e.g., default gateway, DNS server) to devices on the network. This eliminates the need for manual configuration and reduces the risk of errors such as duplicate IP addresses.

DHCP is specifically designed to automate the process of assigning IP addresses dynamically. Manually assigning static IP addresses is the opposite of what DHCP is intended to do, and it is prone to errors and inefficiencies.

Resolving domain names into IP addresses is the function of a DNS (Domain Name System) server, not a DHCP server. While both DHCP and DNS are important for network functionality, they serve different purposes.

Acting as a firewall is not a function of a DHCP server. Firewalls are separate devices or software designed to monitor and control incoming and outgoing network traffic based on security rules. DHCP servers are focused on IP address allocation and configuration.

200

What is the primary purpose of a firewall in a network?

A. To establish a physical connection to the ISP's network.

B. To block unauthorized access while permitting authorized communication.

C. To convert digital signals into analog signals for transmission.

D. To provide high-speed internet access through fiber optic cables.

Correct answer > (B) To block unauthorized access while permitting authorized communication.

Firewalls monitor and control incoming and outgoing network traffic based on predetermined security rules, ensuring that unauthorized access is blocked while legitimate communication is allowed.

A modem connects the local network to the ISP's network by establishing the physical connection to the WAN interface.

Firewalls do not provide internet access; they secure the network.

Firewalls do not handle signal conversion; they focus on network security.

200

Which layer of the TCP/IP model is responsible for putting frames onto the physical network?

A. Internet Layer

B. Link or Network Interface Layer

C. Transport Layer

D. Application Layer

Correct answer > (B) Link or Network Interface Layer.

The Link or Network Interface Layer is responsible for putting frames onto the physical network. This layer handles communication on a local network segment and uses technologies like Ethernet or Wi-Fi. It also identifies node interfaces using MAC addresses.

The Internet Layer is responsible for packet addressing and routing within a network of networks. It does not deal with frames or physical network communication but instead focuses on forwarding data between different networks using IP addresses.

The Transport Layer manages how hosts handle multiple connections for different application protocols. It ensures reliable or unreliable data delivery using protocols like TCP and UDP, but it does not deal with frames or physical network communication.

The Application Layer contains protocols that perform high-level functions, such as web browsing or email. It operates at a much higher level than the Link Layer and does not interact with the physical network or frames.

200

After several new computers are connected to a network device, every computer connected to the device begins to experience slow transfer speeds.

Which of the following is the FIRST step to troubleshoot this problem?

A. Use a loopback plug to determine whether the NIC in each computer is good.

B. Determine whether the network device is a hub or a switch.

C. Use a cable tester to determine whether all cables between each computer and the device are good.

D. Use a loopback plug to determine whether each port on the network device is good.

Correct answer > (B) Determine whether the network device is a hub or switch.

When troubleshooting slow speeds, you need first to determine which device is running slowly (such as a hub or switch). If a specific resource is experiencing slow speeds, you need to focus your efforts on that resource.

The problem is unlikely to be a bad port on the network device, which would only affect one computer.

If the problem is a bad NIC, already knowing whether the network device is a hub or switch would help isolate the problem.

A bad cable would only affect the computer it was connected to, but all computers are experiencing slow transfer speeds in this scenario.

300

Which connector is used with unshielded twisted-pair (UTP) cabling?

A. DIX

B. RJ-45

C. AUI

D. BNC

Correct answer > (B) RJ-45

An RJ-45 connector is used with unshielded twisted-pair (UTP) cabling.

BNC and AUI are used with coaxial cables.

DIX is an Ethernet protocol.

300

What is the primary purpose of the Address Resolution Protocol (ARP) in the TCP/IP model?

A. To ensure reliable data delivery between hosts.

B. To assign IP addresses to devices on a network.

C. To manage high-level application protocols like HTTP and SMTP.

D. To resolve MAC addresses associated with IP addresses.

Correct answer > (D) 

The Address Resolution Protocol (ARP) is used to map or resolve an IP address to a MAC address within the same local network. This is essential for communication between the Internet Layer (IP) and the Link Layer (MAC addresses).

Assigning IP addresses is the role of the Dynamic Host Configuration Protocol (DHCP), not ARP. ARP is focused on resolving MAC addresses for already assigned IP addresses.

Ensuring reliable data delivery is the responsibility of the Transport Layer, specifically the Transmission Control Protocol (TCP). ARP does not handle data delivery or reliability.

Managing high-level protocols like HTTP and SMTP is the responsibility of the Application Layer. ARP operates at a much lower level, facilitating communication between the Internet Layer and the Link Layer.

300

A company is setting up a secure web server to handle sensitive customer transactions.

During testing, the IT team notices that some packets are occasionally lost due to network congestion.

Which protocol should the team use to ensure reliable delivery of data and prevent transaction failures?

A. UDP, because it prioritizes speed and can handle packet loss without retransmissions.

B. DHCP, because it is designed to handle network configuration and can recover from packet loss.

C. TFTP, because it uses its own acknowledgment messaging and is suitable for secure transactions.

D. TCP, because it ensures reliable delivery through acknowledgments, retransmissions, and sequence numbers.

Correct answer > (D) TCP, because it ensures reliable delivery through acknowledgments, retransmissions, and sequence numbers.

TCP is specifically designed to handle scenarios where reliable delivery is critical. TCP uses mechanisms like sequence numbers, acknowledgments (ACK), and retransmissions to ensure that all packets are delivered correctly and in order. This makes it ideal for secure web servers handling sensitive transactions, where missing or corrupted packets could cause failures.

UDP is a connectionless protocol that does not guarantee reliable delivery. It does not retransmit lost packets or ensure that packets are received in order. While UDP is faster, it is unsuitable for scenarios where reliability is critical, such as secure web transactions.

DHCP is not a transport protocol like TCP or UDP. It is used to assign IP configuration information to devices on a network. While DHCP can handle packet loss by restarting the process, it is not designed for reliable data delivery in application-level communications.

TFTP (Trivial File Transfer Protocol) is a simple protocol used for transferring files, often in network device configurations. While it uses its own acknowledgment messaging, it does not provide the robust reliability features of TCP, nor is it suitable for secure transactions.

300

A company is experiencing slow network speeds, and the issue appears to affect multiple users connected to the same switch.

Upon reviewing the switch's configuration, you notice a high number of damaged frames being reported.

What is the MOST likely cause of the issue?

A. An outdated driver on a single user's network adapter

B. External interference affecting the cabling

C. Malware infection on one of the connected hosts

D. Mismatched duplex settings on the network adapter and switch port

Correct answer > (B) External iterference affecting the cabling.

External interference, such as from nearby power lines, fluorescent lighting, or motors, can cause issues like damaged frames in the cabling. This is the most likely cause when multiple users connected to the same switch are affected, and the switch reports damaged frames.

300

A web designer is securely uploading files to a web server. What protocol is the designer using to do this?

A. FTPS

B. FTP

C. SMB

D. NetBIOS

Correct answer > (A) FTPS

The plain File Transfer Protocol (FTP) allows a client to upload files to a web server, but it is unencrypted and poses a high-security risk. FTP-Secure (FTPS) encrypts FTP sessions and is more prevalent than FTP now.

Server Message Block (SMB) is the application protocol underpinning file and printer sharing on Windows networks. SMB usually runs directly over the TCP/445 port.

Windows previously used Network Basic Input/Output System (NetBIOS) instead of TCP/IP. NetBIOS allowed computers to address one another by name and establish sessions for other protocols, such as SMB.

File Transfer Protocol (FTP) allows a client to upload and download files from a network server. A common use of FTP is uploading files to websites.

400

One of your customers has a long-range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally and it sometimes drops connections.

Which of the following is the BEST immediate solution to try to resolve this issue?

A. License a different frequency ranges

B. Increase the power to the access points.

C. Try using a dual-band access point.

D. Try using an unlicensed 801.11 frequency standard.

Correct answer > (B) Increase the power to the access points.

Some wireless access points allow the power to be increased. Increasing the power allows the access point to transmit a longer distance and possibly resolve transmission issues. However, doing so can lead to overheating and instability.

Licensing a different frequency range can be expensive, take time, and may not resolve the issue.

An unlicensed 801.11 frequency standard does not provide the transmission distance to cover several hundred yards (maximum range is up to 300 feet).

A dual-band access point only provides transmissions at 2.4 GHz and 5 GHz, which does not provide sufficient transmission distance.

400

How do DNS Spam Management Records, such as SPF records, help reduce email spam?

A. By blocking all incoming emails from unknown domains

B. By redirecting email traffic to a secure server

C. By encrypting all email messages sent from a domain

D. By specifying which mail servers are authorized to send emails on behalf of a domain

Correct answer > (D) By specifying which mail servers are authorized to send emails on behalf of a domain.

DNS Spam Management Records, such as SPF (Sender Policy Framework) records, help reduce email spam by allowing domain owners to specify which mail servers are authorized to send emails on their behalf. This helps receiving mail servers verify the authenticity of the sender and prevents email spoofing.

DNS Spam Management Records do not deal with encryption. Encryption is handled by other protocols, such as TLS, and is not related to the function of SPF records.

DNS Spam Management Records do not redirect email traffic. Their purpose is to validate the sender's domain, not to manage the routing of email traffic.

DNS Spam Management Records do not block emails outright. Instead, they provide a mechanism for verifying the legitimacy of the sender's domain, allowing mail servers to make informed decisions about accepting or rejecting emails.

400

Why does the Transport layer use port numbers in network communication?

A. To ensure data is routed to the correct network

B. To identify the physical address of the destination device

C. To encrypt data for secure transmission

D. To distinguish between applications communicating on the same device.

Correct answer > (D) To distinguish between applications communicating on the same device.

The Transport layer uses port numbers to identify and distinguish between multiple applications running on the same device. For example, a device might be running a web browser (using port 80 for HTTP) and an email client (using port 25 for SMTP) simultaneously. Port numbers ensure that data is delivered to the correct application.

Identifying the physical address (e.g., MAC address) is the responsibility of the Link layer, not the Transport layer. The Transport layer focuses on managing communication between applications, not physical devices.

Routing data to the correct network is the responsibility of the Internet layer, which uses IP addresses for this purpose. The Transport layer works at a higher level, focusing on application-specific communication.

Encryption is not a function of the Transport layer. While some protocols that operate at the Transport layer (e.g., HTTPS) use encryption, the encryption itself is handled by the application layer or security protocols, not by the Transport layer.

400

A network technician uses a switch configuration interface and sees that a port is continually transitioning between up and down states. What does the network technician witness?

A. Slow network speeds

B. QoS

C. Port flapping

D. RSSI

Correct answer > (C) Port Flapping.

Port flapping is when the network interface card (NIC) or switch interface transitions continually between up and down states. Bad cabling, external interference, or a faulty NIC at the host end can cause this to happen.

There are a variety of problems that can cause slow network speeds, and they can be difficult to diagnose. A technician should apply a structured process to investigate possible causes.

The received signal strength indicator (RSSI) is the signal strength measured at the receiver, using either decibel units or an index value.

Quality of service (QoS) means that switches, access points, and routers are all configured to identify voice over internet protocol (VoIP) data and prioritize it over bursty data.

400

A web developer is tasked with creating a URL for a new product page on the company's secure website. The developer needs to ensure that the URL is correctly structured to access the page using HTTPS.

Given the following components:

Which of the following URLs is correctly structured according to the description of Uniform Resource Locators?

A. https://www.examplecompany.com/products/new-product.html

B. https://examplecompany/products/new-product.html

C. www.examplecompany.com/products/new-product.html

D. http://www.examplecompany.com/products/new-product.html

Correct answer > (A) https://www.examplecompany.com/products/new-product.html


https://www.examplecompany.com/products/new-product.html is the correct answer because it includes the HTTPS protocol, which ensures secure access, the fully qualified domain name (FQDN) "www.examplecompany.com" as the host location, and the correct file path "/products/new-product.html." This structure aligns with the description of a properly formatted URL. 

500

You are an IT technician assisting a small business in a rural area where high-speed broadband options like fiber or cable are unavailable.

The business needs basic internet connectivity to send emails, browse the web, and access cloud-based documents.

Which of the following solutions would be MOST appropriate for their needs?

A. Install a 3G Cellular Radio Internet Connection.

B. Recommend a satellite internet connection for ultra-high speeds.

C. Advise the business to use dial-up internet for connectivity.

D. Suggest waiting for 5G infrastructure to be deployed in the area.

Correct answer > (A) Install a 3G cellular radio internet connection.

3G Cellular Radio Internet Connections are a suitable option for rural areas where high-speed broadband is unavailable. It provides basic internet connectivity with improved speeds compared to older technologies like dial-up, making it sufficient for tasks like email, web browsing, and accessing cloud-based documents.

While satellite internet can be an option in rural areas, it is not known for ultra-high speeds. Additionally, satellite internet often has higher latency and costs compared to 3G, making it less practical for basic connectivity needs.

Waiting for 5G infrastructure is not a practical solution for the business's immediate need for internet connectivity. 3G is already available and can meet their current requirements.

Dial-up internet is outdated and significantly slower than 3G. It would not provide the necessary speed for accessing cloud-based documents or efficient web browsing, making it an unsuitable recommendation.

500

A disaster response team is evaluating Low Earth Orbital (LEO) Satellite Internet Access to establish temporary internet connectivity in a region affected by a natural disaster.

The team needs to analyze the suitability of LEO satellite internet for their operations, which include real-time communication with headquarters, live video streaming of the affected area, and rapid data uploads to cloud storage.

Which of the following factors BEST explains why LEO Satellite Internet Access is a suitable choice for the disaster response team?

A. LEO satellite systems offer unlimited bandwidth, making them ideal for rapid data uploads to cloud storage.

B. LEO satellite systems require minimal hardware, such as a single satellite dish, to maintain a connection.

C. LEO satellite systems provide low latency, making them ideal for real-time communication and live video streaming.

D. LEO satellite systems are unaffected by weather conditions, ensuring uninterrupted connectivity.

Correct answer > (C) LEO satellite systems provide low latency, making them ideal for real-time communication and live video streaming.

LEO satellites orbit much closer to the Earth (500-2,000 km) than geostationary satellites, resulting in significantly lower latency. This low latency is critical for real-time applications such as live video streaming and communication, which are essential for the disaster response team's operations. This factor makes LEO satellite internet a suitable choice for the scenario.

While LEO satellite systems do require hardware, such as a satellite dish or terminal, they often need advanced tracking systems to maintain a connection with the moving satellites in the constellation. This is more complex than the hardware required for geostationary systems, making this statement inaccurate.

Like all satellite internet systems, LEO satellite connections can be affected by adverse weather conditions, such as heavy rain or storms, which can cause signal degradation. This statement is incorrect because weather can still impact LEO satellite internet performance.

While LEO satellite systems can provide high bandwidth, the availability of unlimited bandwidth depends on the service provider and the specific plan chosen. Bandwidth limitations may still apply, and this statement does not accurately reflect the capabilities of LEO satellite systems in general.

500

What is a key characteristic of a legacy system?

A. A legacy system is no longer directly supported by its vendor.

B. A legacy system is designed to integrate seamlessly with new technologies.

C. A legacy system is always supported by its vendor with regular updates.

D. A legacy system is typically used for modern applications and services.

Correct answer > (A) A legacy system is no longer directly supported by its vendor.

A legacy system is one that is no longer directly supported by its vendor. This lack of support is a defining characteristic of legacy systems and poses security risks.

A legacy system is defined by the fact that it is no longer directly supported by its vendor. This means that regular updates and support are not provided, which is a significant risk factor for such systems.

500

Which of the following statements about Server Message Block (SMB) accurately describes its current security status and implementation in modern networks?

A. SMB1 is the most secure version of the Server Message Block protocol and is enabled by default on all current Windows versions.

B. SMB is only used for printer sharing on Windows networks and does not support file sharing functionalities.

C. SMB2 is the latest version of the Server Message Block protocol and is primarily used for file sharing on UNIX-based systems.

D. SMB3 is the current version of the Server Message Block protocol and is considered secure, while SMB1 has serious security vulnerabilities and is disabled by default on current Windows versions.

Correct answer > (D) SMB3 is the current version of the Server Message Block protocol and is considered secure, while SMB1 has serious security vulnerabilities and is disabled by default on current Windows versions.

SMB3 is the current version and is secure, whereas SMB1 has vulnerabilities and is disabled by default on modern Windows systems.

SMB1 is not the most secure version; it has serious security vulnerabilities and is disabled by default on current Windows versions.

SMB2 is not the latest version; SMB3 is. Additionally, SMB is primarily used for file and printer sharing on Windows networks, not specifically on UNIX-based systems.

SMB is used for both file and printer sharing on Windows networks, not exclusively for printer sharing.

500

You are a network administrator tasked with securing remote access to your company's servers. You currently use Telnet for remote terminal access but are concerned about its security vulnerabilities.

You decide to implement Secure Shell (SSH) instead.

Which of the following actions should you take to ensure a secure transition from Telnet to SSH?

A. Configure SSH to use the same port as Telnet to maintain compatibility with existing firewall rules.

B. Disable SSH's encryption features to improve connection speed and reduce latency.

C. Implement SSH with public key authentication to enhance security and eliminate the need for password-based logins.

D. Allow both Telnet and SSH to run simultaneously to provide users with a choice of connection methods.

Correct answer > (C) Implement SSH with public key authentication to enhance security and eliminate the need for password-based logins. 

Implementing SSH with public key authentication is a best practice for enhancing security. It eliminates the need for password-based logins, reducing the risk of password interception and unauthorized access.

While configuring SSH to use the same port as Telnet might seem convenient, it is not a recommended practice. SSH typically uses port 22, which is standard for secure communications. Changing the default port can lead to confusion and potential security issues.

Disabling SSH's encryption features would defeat the purpose of using SSH, which is to provide a secure, encrypted communication channel. Encryption is essential for protecting data integrity and confidentiality.

Running both Telnet and SSH simultaneously is not advisable, as it leaves the network vulnerable to the security risks associated with Telnet. The goal should be to transition fully to SSH to ensure secure remote access.