To increase the speed of data transmission
To reduce latency in the network
To encrypt data for secure transmission
To divide the available bandwidth into multiple channels
Ethernet
IP
HTTP
TCP
OSPF
ICMP
300.200.100.50
192.168.1.1
10.0.0.1
255.255.255.255
Secure/ MIME
Web Service Security
FIPS
Secure Sockets Layer
Simplex
Half Duplex
Full Duplex
Double Duplex
Subnetting
MAC address filtering
VLAN
CSMA/CD
Translating IP addresses to domain names
Converting domain names to IP addresses
Assigning IP addresses to devices
Storing user passwords
Star
Ring
Tree
Binary
File sharing
Database management
Peer-to-peer connection
Web hosting
MX record
CNAME record
A record
PTR record
Filtering
Encoding
Switching
None of the mentioned
Cutoff frequency
Low frequencies
upper high frequencies
443
80
22
21
Encrypting data transmissions
Blocking unauthorized access to a network
Managing cryptographic keys
Monitoring network traffic for malware
Bandwidth
Latency
Packet size
All of the above
MAN
NAN
WAN
None of these
Time-To-Live (TTL)
Destination Address
Source Address
Checksum
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
Spoofing
Ransomware
Phishing
Keylogging
Filtering packets based on port numbers
Translating domain names to IP addresses
Determining the best path for forwarding packets to their destination
Establishing secure connections between hosts
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
Encryption
Multiplexing
Segmentation
Framing
Denial-of-service attack
SQL injection
Man-in-the-middle attack
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
To map an IP address to a MAC address
Wi-Fi Protected Access
Wireless Protected Access
Wired Protected Access
Wireless Private Access
Ensuring secure encryption of data transmitted over the Internet.
Establishing physical connections between devices on the Internet.
Assigning unique addresses to devices and facilitating packet routing.
Controlling access to Internet resources through user authentication.
Password
Combined Approach
Public-Key
Telnet
Active receiver
Ethernet LAN
Microwaves
UDP
structure and behaviour of a computer system as observed by the developer
structure and behaviour of a computer system as observed by the user
structure of a computer system as observed by the developer
None of the above
Software
Protocol
Hardware
Define protocols for cellular networks
Specify protocols for wired Ethernet networks
Establish guidelines for satellite communication
Standardize protocols for local area wireless networks
Wi-Fi
Fiber optics
Bluetooth
It decreases the efficiency of data transmission
It involves combining multiple signals into a single transmission medium
It can only be used in analog communication systems
It reduces the complexity of the network
IP/Netmask
IP/Subnet
IP/Router
IP/DNS
Router
Hub
Repeater
Switch
Computer Security
Information Security
Network Security
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
255.0.0.0
255.255.255.0
255.255.0.0
/24
/16
/32
/8
Bus
Mesh
FTP
DNS
They require a centralized server
They can be less secure than client-server networks
They are more difficult to set up
They have limited scalability
25
Faster data transmission
Easier network management
Reduced cost of hardware
Larger bandwidth allocation
Firewall
Gateway
Virus checker
Bandwidth is always higher than throughput
Bandwidth and throughput are the same
Bandwidth defines the theoretical maximum data rate, while throughput is the actual data rate achieved
Throughput is always higher than bandwidth
Physical layer
Data Link layer
Transport layer
Application layer
To establish a connection
To terminate a connection
To transmit data
To check for errors in data