6. Assume you are the Network Administrator for your XYZ company. What type of device should you select to connect the two groups of computers so that data communication can occur?
A. Bridge
B. Hub
C. Switch
D. Router
Answer . C. Switch
Tag . 5 Data Communication and Computer Networking 4
7. What does a firewall do in network security?
A. Scans for malware
B. Encrypts network traffic
C. Manages user access permissions
D. Filters incoming and outgoing network traffic
Answer . D. Filters incoming and outgoing network traffic
Tag . 5 Data Communication and Computer Networking 4
24. Which of the following is a best practice for securing wireless networks?
A. Using strong WPA3 encryption
B. Keeping default router settings
C. Using WEP encryption
D. Disabling SSID broadcast
Answer . A. Using strong WPA3 encryption
Tag . 5 Data Communication and Computer Networking 4
25. Which protocol is commonly used to secure communications over a network?
A. FTP
B. Telnet
C. SSH
D. HTTP
Answer . C. SSH
Tag . 5 Data Communication and Computer Networking 4
26. In the OSI reference model, which layer consists of the LLC and MAC layer?
A. Application Layer
B. Physical Layer
C. Network Layer
D. Data Link Layer
Answer . D. Data Link Layer
Tag . 5 Data Communication and Computer Networking 4