Unshielded twisted pair
Optical fiber
Coaxial cable
Microwave
By counting the number of 1s in the data
By summing all the data bits and taking the complement
By XORing all the data bytes
By appending a fixed checksum value to the data
Internet
Botnet
Telnet
D-net
File sharing
Database management
Peer-to-peer connection
Web hosting
Collision Detection and Retransmission (CDR)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Token passing mechanism
Packet switching
Filtering
Encoding
Switching
None of the mentioned
443
80
22
21
802.11
802.5
802.4
802.2
MAN
NAN
WAN
None of these
WEP
WPA
WEP2
WPA2
RSA algorithm
Diffie-Hellman algorithm
Electronic code book algorithm
32 bits
64 bits
128 bits
256 bits
MX record
CNAME record
A record
PTR record
Error detection and correction
Routing
Flow control
Framing
Password
Combined Approach
Public-Key
Encryption
Multiplexing
Segmentation
To map an IP address to a MAC address
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
block cipher
stream cipher
bit cipher
none of the mentioned
300.200.100.50
192.168.1.1
10.0.0.1
255.255.255.255
Physical layer
Data Link layer
Transport layer
Application layer
Physical Layer
Data Link Layer
Transport Layer
Presentation Layer
Phishing
Denial-of-service attack
SQL injection
Man-in-the-middle attack
Simplex
Half Duplex
Full Duplex
Double Duplex
Active receiver
Passive receiver
Both of the mentioned
Hyper terminal tracing program
Hypertext tracing protocol
Hypertext transfer protocol
Hypertext transfer program
Encryption of data
To transmit faster
To detect errors
To identify the user
HTTP
SMTP
FTP
SNMP
DHCP
DNS
Wide Area Net
Wide Access Network
Wide Area Network
Wide Access Net
/24
/16
/32
/8
Higher data transfer rates
Reduced susceptibility to noise
Greater compatibility with modern devices
Lower power consumption
Bandwidth is always higher than throughput
Bandwidth and throughput are the same
Bandwidth defines the theoretical maximum data rate, while throughput is the actual data rate achieved
Throughput is always higher than bandwidth
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
ARP
ICMP
RARP
The number of bits transferred per second
The frequency of the carrier wave
The number of errors corrected per second
The speed of the modem
High level of security
Scalability limitations
Ease of setup and maintenance
Centralized control over resources
Ring
Local Area
Hierarchical
Star
Subnetting
MAC address filtering
VLAN
CSMA/CD
It immediately retransmits the frame.
It sends a jam signal to inform other devices of the collision.
It waits for a random amount of time before retransmitting.
It increases the transmission power to avoid collisions.
Time-To-Live (TTL)
Destination Address
Source Address
Checksum
10BASE-T
100BASE-TX
1000BASE-T
10GBASE-T
Wi-Fi Protected Access
Wireless Protected Access
Wired Protected Access
Wireless Private Access
Private key encryption
Public key encryption
Symmetric key encryption
Hybrid encryption
Ethernet
IP
TCP
Combining multiple signals into a single transmission medium
Assigning different frequencies to each channel
Dividing the transmission time into fixed intervals
Utilizing different modulation techniques for each channel
IP/Netmask
IP/Subnet
IP/Router
IP/DNS
Ensuring secure encryption of data transmitted over the Internet.
Establishing physical connections between devices on the Internet.
Assigning unique addresses to devices and facilitating packet routing.
Controlling access to Internet resources through user authentication.
It specifies the total length of the TCP segment
It indicates the length of the TCP header in 32-bit words
It denotes the maximum segment size that can be transmitted
It identifies the TCP version being used