6. Assume you are the Network Administrator for your XYZ company. What type of device should you select to connect the two groups of computers so that data communication can occur?

A. Bridge
B. Hub
C. Switch
D. Router

Answer . C. Switch

Tag . 5 Data Communication and Computer Networking 4

7. What does a firewall do in network security?

A. Scans for malware
B. Encrypts network traffic
C. Manages user access permissions
D. Filters incoming and outgoing network traffic

Answer . D. Filters incoming and outgoing network traffic

Tag . 5 Data Communication and Computer Networking 4

24. Which of the following is a best practice for securing wireless networks?

A. Using strong WPA3 encryption
B. Keeping default router settings
C. Using WEP encryption
D. Disabling SSID broadcast

Answer . A. Using strong WPA3 encryption

Tag . 5 Data Communication and Computer Networking 4

25. Which protocol is commonly used to secure communications over a network?

A. FTP
B. Telnet
C. SSH
D. HTTP

Answer . C. SSH

Tag . 5 Data Communication and Computer Networking 4

26. In the OSI reference model, which layer consists of the LLC and MAC layer?

A. Application Layer
B. Physical Layer
C. Network Layer
D. Data Link Layer

Answer . D. Data Link Layer

Tag . 5 Data Communication and Computer Networking 4