3d1x2 5 Level CDC Vol. 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Woodjh
W
Woodjh
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,190
Questions: 93 | Attempts: 1,214

SettingsSettingsSettings
CDC Quizzes & Trivia

Questions and Answers
  • 1. 

    What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?

    • A.

      A code set is established.

    • B.

      A word is created.

    • C.

      An octet is formed.

    • D.

      Nothing.

    Correct Answer
    A. A code set is established.
    Explanation
    When more bits are added to a digital signal arranged in a sequence understood by the sender and receiver, a code set is established. This means that the additional bits are used to represent different symbols or characters, allowing for a wider range of information to be transmitted and understood. The code set defines the mapping between the digital signal and the corresponding symbols or characters, enabling effective communication between the sender and receiver.

    Rate this question:

  • 2. 

    How many possible symbols can 4 bits represent?

    • A.

      2

    • B.

      4

    • C.

      8

    • D.

      16

    Correct Answer
    D. 16
    Explanation
    Four bits can represent 2^4 = 16 possible symbols. Each bit can have two possible values, 0 or 1. Therefore, with four bits, there are 2 * 2 * 2 * 2 = 16 different combinations, each representing a unique symbol.

    Rate this question:

  • 3. 

    In networking, a byte is identified as a/an

    • A.

      Bit.

    • B.

      Word.

    • C.

      Octet.

    • D.

      Letter.

    Correct Answer
    C. Octet.
    Explanation
    An octet is the term used in networking to identify a byte. A byte consists of 8 bits, and an octet is a group of 8 bits. This term is commonly used in networking protocols and standards to refer to a sequence of 8 bits.

    Rate this question:

  • 4. 

    What organization sets important computer networking wiring standards for residential and commercial network cabling?

    • A.

      Electronic Industries Alliance (EIA).

    • B.

      Telecommunications Industry Association (TIA).

    • C.

      The American National Standards Institute (ANSI).

    • D.

      The National Institute of Standards and Technology (NIST).

    Correct Answer
    A. Electronic Industries Alliance (EIA).
    Explanation
    The Electronic Industries Alliance (EIA) sets important computer networking wiring standards for residential and commercial network cabling.

    Rate this question:

  • 5. 

    What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?

    • A.

      568A

    • B.

      569A

    • C.

      570A

    • D.

      606A

    Correct Answer
    A. 568A
    Explanation
    The correct answer is 568A. The 568A standard, developed by the Electronic Industries Alliance (EIA) and the Telecommunications Industry Association (TIA), is used for commercially building telecommunications cabling. This standard specifies the wiring arrangement and color codes for eight-pin modular connectors, commonly known as RJ45 connectors, used in Ethernet connections. It ensures consistency and compatibility in the installation of telecommunications cabling systems.

    Rate this question:

  • 6. 

    Which of the following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?

    • A.

      E-carrier.

    • B.

      Structured query language.

    • C.

      International Organization for Standardization.

    • D.

      American Standard Code for Information Interchange.

    Correct Answer
    A. E-carrier.
    Explanation
    The correct answer is E-carrier. E-carrier is an International Telecommunication Union (ITU) standardized format that is used for digital telecommunications services backbone system. It is widely used in Europe, Asia, and Australia for transmitting voice and data over digital networks. The E-carrier system provides a hierarchical structure for multiplexing multiple digital signals onto a single transmission medium, allowing for efficient and reliable communication.

    Rate this question:

  • 7. 

    There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      Institute of Electrical and Electronics Engineers (IEEE).

    • C.

      European Telecommunications Standards Institute (ETSI).

    • D.

      Internet Corporation for Assigned Names and Numbers (ICANN).

    Correct Answer
    B. Institute of Electrical and Electronics Engineers (IEEE).
    Explanation
    The correct answer is Institute of Electrical and Electronics Engineers (IEEE). IEEE is a worldwide nonprofit association of technical professionals that promotes the development of standards in various fields, including electrical engineering, electronics, telecommunications, and computer science. While organizations like IETF, ETSI, and ICANN also play important roles in establishing standards, IEEE is specifically known for its contributions in the field of electrical and electronics engineering.

    Rate this question:

  • 8. 

    A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      Institute of Electrical and Electronics Engineers (IEEE).

    • C.

      European Telecommunications Standards Institute (ETSI).

    • D.

      Internet Corporation for Assigned Names and Numbers (ICANN).

    Correct Answer
    B. Institute of Electrical and Electronics Engineers (IEEE).
    Explanation
    The correct answer is Institute of Electrical and Electronics Engineers (IEEE). The IEEE developed a collection of standards for LAN architectures, protocols, and technologies called Project 802. The IEEE is a professional association that focuses on the advancement of technology in various fields, including electrical engineering and computer science. They are responsible for setting standards in the industry to ensure compatibility and interoperability between different devices and systems.

    Rate this question:

  • 9. 

    The “parent” organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      International Telecommunication Union (ITU).

    • C.

      Institute of Electrical and Electronics Engineers (IEEE).

    • D.

      International Telegraph and Telephone Consultative Committee (CCITT).

    Correct Answer
    B. International Telecommunication Union (ITU).
    Explanation
    The correct answer is the International Telecommunication Union (ITU). The ITU is the parent organization for all other telecommunications organizations and is headquartered in Geneva, Switzerland. It is responsible for coordinating and standardizing global telecommunications networks and services. The ITU plays a crucial role in promoting international cooperation in the field of telecommunications and ensuring the interoperability of different communication systems worldwide.

    Rate this question:

  • 10. 

    What organization is responsible for the X-series and V-series standards?

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      International Telecommunication Union (ITU).

    • C.

      Institute of Electrical and Electronics Engineers (IEEE).

    • D.

      International Telecommunication Union Telecommunications Standardization Sector (ITU-T).

    Correct Answer
    D. International Telecommunication Union Telecommunications Standardization Sector (ITU-T).
    Explanation
    The correct answer is International Telecommunication Union Telecommunications Standardization Sector (ITU-T). ITU-T is responsible for the X-series and V-series standards. The X-series standards cover data networks and open system communications, while the V-series standards cover data communication over the telephone network. The ITU-T is a specialized agency of the International Telecommunication Union (ITU) that focuses on developing and maintaining telecommunications standards.

    Rate this question:

  • 11. 

    Which series of standards are recommended for data transmission using the telephone network?

    • A.

      T

    • B.

      V

    • C.

      X

    • D.

      Z

    Correct Answer
    B. V
    Explanation
    The correct answer is V. The V series of standards are recommended for data transmission using the telephone network. These standards define protocols and procedures for various types of data communication, including dial-up modems, fax machines, and digital subscriber lines (DSL). The V series standards ensure compatibility and reliable data transmission over the telephone network.

    Rate this question:

  • 12. 

    The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

    • A.

      Internet Engineering Task Force (IETF).

    • B.

      International Telecommunication Union (ITU).

    • C.

      International Organization for Standardization (ISO).

    • D.

      Institute of Electrical and Electronics Engineers (IEEE).

    Correct Answer
    C. International Organization for Standardization (ISO).
    Explanation
    The Open System Interconnect (OSI) reference model was developed by the International Organization for Standardization (ISO). This model is a conceptual framework that standardizes the functions of a communication system into seven different layers. It provides a common language and structure for different network technologies to communicate with each other. The ISO's contribution in creating the OSI model has been significant in the field of networking and has helped in the development and interoperability of various networking protocols and technologies.

    Rate this question:

  • 13. 

    Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS–232–C standard prescribes bipolar-voltage serial data transmission?

    • A.

      25

    • B.

      50

    • C.

      100

    • D.

      200

    Correct Answer
    B. 50
    Explanation
    The EIA RS-232-C standard prescribes bipolar-voltage serial data transmission within 50 feet of the data communications equipment (DCE) connection. This means that the standard specifies that the transmission can be done without loss or degradation of signal quality within this distance.

    Rate this question:

  • 14. 

    Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?

    • A.

      RS–232–C.

    • B.

      RS–423.

    • C.

      RS–485.

    • D.

      RS–530.

    Correct Answer
    D. RS–530.
    Explanation
    RS-530 is the correct answer because it is an Electronics Industries Alliance (EIA) interface standard that has the ability to work in either balanced or unbalanced electrical circuits. RS-232-C, RS-423, and RS-485 are also EIA interface standards, but they do not have the same flexibility as RS-530 in terms of working in both balanced and unbalanced circuits.

    Rate this question:

  • 15. 

    What transmission rates does Electronic Industries Alliance (EIA) RS–530 accommodate?

    • A.

      20 kilobits per second (Kbps) to 200 Kbps.

    • B.

      20 Kbps to 2 megabits per second (Mbps).

    • C.

      20 Kbps to 20 Mbps.

    • D.

      20 Kbps to 22 Mbps.

    Correct Answer
    B. 20 Kbps to 2 megabits per second (Mbps).
    Explanation
    The Electronic Industries Alliance (EIA) RS-530 accommodates transmission rates ranging from 20 kilobits per second (Kbps) to 2 megabits per second (Mbps).

    Rate this question:

  • 16. 

    What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

    • A.

      High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC).

    • B.

      Logical Link Control (LLC) and Media Access Control (MAC).

    • C.

      Data communications equipment (DCE) and data terminal equipment (DTE).

    • D.

      Electronic Industries Alliance (EIA) RS–232 and RS–530.

    Correct Answer
    B. Logical Link Control (LLC) and Media Access Control (MAC).
    Explanation
    The Institute of Electrical and Electronics Engineers (IEEE) divided the Open System Interconnect (OSI) data link layers into Logical Link Control (LLC) and Media Access Control (MAC). The LLC sublayer handles flow control, error control, and framing, while the MAC sublayer is responsible for controlling access to the physical media and handling media contention.

    Rate this question:

  • 17. 

    At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?

    • A.

      Application.

    • B.

      Session.

    • C.

      Presentation.

    • D.

      Transport.

    Correct Answer
    C. Presentation.
    Explanation
    Common data compression and encryption schemes are used at the Presentation layer of the OSI model. This layer is responsible for the formatting and presentation of data, including encryption, compression, and other transformations that ensure data integrity and confidentiality. The Presentation layer prepares the data for the Application layer by converting it into a format that can be easily understood by the receiving system.

    Rate this question:

  • 18. 

    What Open System Interconnect (OSI) layer is closest to the end user?

    • A.

      Application.

    • B.

      Session

    • C.

      Presentation.

    • D.

      Transport.

    Correct Answer
    A. Application.
    Explanation
    The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user and is responsible for tasks such as file transfers, email services, and web browsing. It interacts with software applications that the user interacts with, making it the closest layer to the end user.

    Rate this question:

  • 19. 

    In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

    • A.

      Layer above.

    • B.

      Layer below.

    • C.

      Lowest layer.

    • D.

      Peer layer.

    Correct Answer
    C. Lowest layer.
    Explanation
    The lowest layer is not one of the layers that a layer in the OSI model communicates with. The OSI model consists of seven layers, and each layer communicates with the layer above, the layer below, and its peer layer. The lowest layer, also known as the physical layer, is responsible for the actual transmission and reception of data on the physical medium, such as cables or wireless signals. It does not communicate with any other layers in the model.

    Rate this question:

  • 20. 

    Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

    • A.

      Frame.

    • B.

      Packet.

    • C.

      Segment.

    • D.

      Datagram.

    Correct Answer
    D. Datagram.
    Explanation
    The correct answer is Datagram. A datagram is an information unit that uses connectionless network service. It is a self-contained unit of data that includes both the source and destination addresses. Unlike other information units like frames, packets, and segments, datagrams do not require a pre-established connection between the source and destination. Instead, they are individually routed and delivered independently, making them suitable for connectionless network services.

    Rate this question:

  • 21. 

    What data communication protocol is used to govern the flow and format of information between systems?

    • A.

      Character-oriented.

    • B.

      Bit-oriented.

    • C.

      Routing.

    • D.

      Network.

    Correct Answer
    A. Character-oriented.
    Explanation
    Character-oriented protocols are used to govern the flow and format of information between systems. These protocols focus on the transmission and interpretation of characters or symbols, rather than individual bits or routing of data. They ensure that the data is properly formatted and transmitted in a way that both the sending and receiving systems can understand. This type of protocol is commonly used in applications such as text messaging, email, and file transfers.

    Rate this question:

  • 22. 

    In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?

    • A.

      SEQ

    • B.

      SYN

    • C.

      STX

    • D.

      EST

    Correct Answer
    B. SYN
    Explanation
    In binary-synchronous protocol, the character "SYN" is used to establish and maintain character synchronization prior to the message block and during transmission. This character helps to ensure that the sender and receiver are in sync and can accurately interpret the data being transmitted. It acts as a signal to indicate the start and end of a message, allowing for reliable communication between devices.

    Rate this question:

  • 23. 

    What data communication protocol is based on bits and the position of the bits?

    • A.

      Character-oriented.

    • B.

      Bit-oriented.

    • C.

      Routing

    • D.

      Network.

    Correct Answer
    B. Bit-oriented.
    Explanation
    Bit-oriented is the correct answer because this data communication protocol is based on individual bits and their positions. It focuses on the manipulation and transmission of bits, ensuring accurate and reliable data transfer. Character-oriented protocols, on the other hand, deal with complete characters or groups of characters rather than individual bits. Routing and network are not relevant to the question as they refer to different aspects of data communication.

    Rate this question:

  • 24. 

    What data communication protocol ensures that the receiving station can distinguish information from garbage?

    • A.

      Asynchronous protocol.

    • B.

      Binary synchronous protocol.

    • C.

      Synchronous Data Link Control (SDLC).

    • D.

      High-Level Data Link Control (HDLC).

    Correct Answer
    D. High-Level Data Link Control (HDLC).
    Explanation
    HDLC is a data communication protocol that ensures the receiving station can distinguish information from garbage. HDLC provides a mechanism for error detection and correction, as well as flow control, ensuring that the data received is accurate and reliable. It uses a synchronous transmission method, where data is transmitted in a continuous stream, and includes control characters to indicate the start and end of frames, allowing the receiving station to properly interpret the data. This protocol is widely used in telecommunications and networking systems to ensure the integrity of data transmission.

    Rate this question:

  • 25. 

    A group of computers and associated devices that share a common communications line within a small geographic area is a

    • A.

      Metropolitan area network (MAN).

    • B.

      Local area network (LAN).

    • C.

      Wide area network (WAN).

    • D.

      Virtual private network (VPN).

    Correct Answer
    B. Local area network (LAN).
    Explanation
    A local area network (LAN) is a group of computers and devices that are connected together and share a common communications line within a small geographic area. LANs are typically used in homes, offices, or schools where the computers and devices are located in close proximity to each other. This allows for efficient and fast communication between the devices on the network. In contrast, a metropolitan area network (MAN) covers a larger geographic area, a wide area network (WAN) covers an even larger area, and a virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the internet, to provide secure remote access to a private network.

    Rate this question:

  • 26. 

    The interconnection of several networks in a city into a single larger network is a

    • A.

      Local area network (LAN).

    • B.

      Wide area network (WAN).

    • C.

      Virtual private network (VPN).

    • D.

      Metropolitan area network (MAN).

    Correct Answer
    D. Metropolitan area network (MAN).
    Explanation
    A metropolitan area network (MAN) refers to the interconnection of several networks within a city to form a larger network. Unlike a local area network (LAN) which is limited to a small geographical area, a MAN covers a larger area such as a city or metropolitan region. This allows for the sharing of resources and communication between different networks within the city. Therefore, a MAN is the most suitable option for the given scenario.

    Rate this question:

  • 27. 

    What type of network connects networks that are typically separated by geographical distances?

    • A.

      Local area network (LAN).

    • B.

      Wide area network (WAN).

    • C.

      Virtual private network (VPN).

    • D.

      Metropolitan area network (MAN).

    Correct Answer
    B. Wide area network (WAN).
    Explanation
    A wide area network (WAN) is a type of network that connects networks that are typically separated by geographical distances. Unlike a local area network (LAN) which is confined to a small area, a WAN covers a larger area and allows for communication between different LANs or other networks that are located in different locations. This type of network is commonly used by organizations to connect their offices or branches that are located in different cities or countries.

    Rate this question:

  • 28. 

    What type of network enables a group of two or more computer systems to communicate over the public Internet?

    • A.

      Local area network (LAN).

    • B.

      Wide area network (WAN).

    • C.

      Virtual private network (VPN).

    • D.

      Metropolitan area network (MAN).

    Correct Answer
    C. Virtual private network (VPN).
    Explanation
    A virtual private network (VPN) enables a group of two or more computer systems to communicate over the public Internet. Unlike a local area network (LAN) or a wide area network (WAN), which are physical networks confined to a specific location or geographical area, a VPN creates a secure and encrypted connection over the Internet, allowing users to access and share data as if they were directly connected to a private network. This makes VPNs a popular choice for businesses and organizations that need to connect remote offices or provide secure access for remote workers.

    Rate this question:

  • 29. 

    Which type network enables users to share resources, files, and printers in a decentralized way?

    • A.

      Intranet.

    • B.

      Extranet.

    • C.

      Peer-to-peer.

    • D.

      Client-server.

    Correct Answer
    C. Peer-to-peer.
    Explanation
    A peer-to-peer network enables users to share resources, files, and printers in a decentralized way. In this type of network, each computer can act as both a client and a server, allowing users to directly connect and share resources with each other without the need for a central server. This allows for greater flexibility and independence among users, as they can easily access and share resources with each other without relying on a central authority.

    Rate this question:

  • 30. 

    What Network layer protocol provides information about how and where data should be delivered, including the data’s source and destination addresses?

    • A.

      Internet protocol (IP).

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reverse Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    A. Internet protocol (IP).
    Explanation
    The correct answer is Internet protocol (IP). IP is a network layer protocol that provides information about how and where data should be delivered, including the data's source and destination addresses. It is responsible for routing packets across different networks and ensuring that they reach their intended destination. IP is a fundamental protocol in the TCP/IP suite and is used for communication over the internet.

    Rate this question:

  • 31. 

    Which Network layer protocol matches a known internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

    • A.

      Internet protocol (IP).

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reverse Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    B. Address Resolution Protocol (ARP).
    Explanation
    The correct answer is Address Resolution Protocol (ARP). ARP is a network layer protocol that is used to match a known IP address to a MAC address. It is responsible for resolving IP addresses to MAC addresses in order to facilitate communication between devices on a local network. When a device wants to send data to another device on the same network, it needs to know the MAC address of the destination device. ARP helps in mapping the IP address to the corresponding MAC address, allowing the data to be properly delivered.

    Rate this question:

  • 32. 

    Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?

    • A.

      Internet protocol (IP).

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reverse Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    C. Reverse Address Resolution Protocol (RARP).
    Explanation
    RARP is a network layer protocol that provides the IP address for a device that knows its own MAC address. It allows a device to request its IP address from a RARP server using its MAC address as a reference. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically. ARP, ICMP, and IP are not specifically designed for this purpose.

    Rate this question:

  • 33. 

    Which Transport layer protocol does not guarantee that packets will be received at all?

    • A.

      Internet protocol (IP).

    • B.

      User Datagram Protocol (UDP).

    • C.

      Transmission Control Protocol (TCP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    B. User Datagram Protocol (UDP).
    Explanation
    UDP is a transport layer protocol that does not guarantee the delivery of packets. Unlike TCP, which ensures reliable and ordered delivery, UDP is a connectionless protocol that does not establish a connection before sending data. It does not track whether packets are received or not, making it a faster but less reliable option. ICMP is a network layer protocol used for diagnostic and error reporting, while IP is a network layer protocol responsible for addressing and routing packets.

    Rate this question:

  • 34. 

    Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?

    • A.

      File Transfer Protocol (FTP).

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. File Transfer Protocol (FTP).
    Explanation
    FTP is the correct answer because it is an application layer protocol specifically designed for sending and receiving files over a TCP/IP network. FTP provides a set of commands that allow users to authenticate, navigate directories, and transfer files between a client and a server. It is widely used for file sharing and is supported by most operating systems. TFTP, SMTP, and HTTP are also application layer protocols, but they serve different purposes such as simple file transfers, email transmission, and web browsing respectively.

    Rate this question:

  • 35. 

    Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?

    • A.

      File Transfer Protocol (FTP).

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    B. Trivial File Transfer Protocol (TFTP).
    Explanation
    TFTP is simpler than FTP when transferring files between computers. TFTP is a lightweight protocol that only provides basic file transfer functionality, whereas FTP is a more comprehensive protocol with additional features such as directory listing and file manipulation. TFTP is commonly used in scenarios where simplicity and efficiency are prioritized over advanced functionality. SMTP and HTTP are not file transfer protocols, but rather protocols used for email and web communication respectively.

    Rate this question:

  • 36. 

    Which Application layer protocol is a terminal emulation used to log on to remote hosts?

    • A.

      Teletype Network.

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. Teletype Network.
    Explanation
    The correct answer is Teletype Network. Teletype Network is an application layer protocol used for terminal emulation, allowing users to log on to remote hosts. It provides a means of communication between a user and a remote system, enabling the user to interact with the remote host as if they were directly connected to it via a physical terminal. This protocol is commonly used in scenarios where remote access to a host is required, such as in the case of remote administration or remote troubleshooting.

    Rate this question:

  • 37. 

    Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

    • A.

      Dynamic Host Configuration Protocol (DHCP).

    • B.

      Trivial File Transfer Protocol (TFTP).

    • C.

      Simple Mail Transfer Protocol (SMTP).

    • D.

      Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. Dynamic Host Configuration Protocol (DHCP).
    Explanation
    The correct answer is Dynamic Host Configuration Protocol (DHCP). DHCP is an application layer protocol that automates the process of assigning unique IP addresses to devices on a network. It allows for the dynamic allocation of IP addresses, making it easier to manage and configure network devices. DHCP eliminates the need for manual IP address assignment and ensures efficient utilization of available IP addresses.

    Rate this question:

  • 38. 

    Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

    • A.

      Dynamic Host Configuration Protocol (DHCP).

    • B.

      Network Time Protocol (NTP).

    • C.

      File Transfer Protocol (FTP).

    • D.

      Ping.

    Correct Answer
    D. Ping.
    Explanation
    Ping is a utility that can verify that TCP/IP is installed and communicating with the network. It sends a small packet of data to a specific IP address and waits for a response. If a response is received, it indicates that the TCP/IP stack is functioning properly and the network connection is active. This makes Ping a useful tool for troubleshooting network connectivity issues and testing network performance. DHCP is a protocol for automatically assigning IP addresses, NTP is a protocol for synchronizing clocks on network devices, and FTP is a protocol for transferring files over a network. None of these protocols specifically verify TCP/IP installation or communication.

    Rate this question:

  • 39. 

    The physical address of any device on the network is a/an

    • A.

      Internet protocol version 4 (IPv4) address.

    • B.

      Internet protocol version 6 (IPv6) address.

    • C.

      Static internet protocol (IP) address.

    • D.

      Media Access Control (MAC) address.

    Correct Answer
    D. Media Access Control (MAC) address.
    Explanation
    The physical address of any device on the network is a Media Access Control (MAC) address. A MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment. It is used to identify devices on a local network and is different from an IP address. MAC addresses are assigned by the manufacturer and are hardcoded into the network interface card, making them unique to each device.

    Rate this question:

  • 40. 

    What are the two parts to an Internet Protocol version 4 (IPv4) address?

    • A.

      Network and host.

    • B.

      Network and class.

    • C.

      Class and host.

    • D.

      Network and octet.

    Correct Answer
    A. Network and host.
    Explanation
    An Internet Protocol version 4 (IPv4) address is divided into two parts: the network portion and the host portion. The network portion identifies the specific network that the device is connected to, while the host portion identifies the specific device within that network. This division allows for efficient routing of data packets across the internet, ensuring that they reach the correct destination.

    Rate this question:

  • 41. 

    What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?

    • A.

      Subnet host.

    • B.

      Subnet network.

    • C.

      Subnet mask.

    • D.

      Host mask.

    Correct Answer
    C. Subnet mask.
    Explanation
    A subnet mask is used on a TCP/IP network to determine which network a computer is on. It is a 32-bit number that is used to divide an IP address into network and host portions. The subnet mask is applied to the IP address to determine the network address. By comparing the network address of the computer with the network address of other computers, it can be determined whether they are on the same network or not. Therefore, the subnet mask is used to determine the network a computer is on.

    Rate this question:

  • 42. 

    How many subnet bits are required to support 90 subnets on a Class B network?

    • A.

      3

    • B.

      5

    • C.

      7

    • D.

      9

    Correct Answer
    C. 7
    Explanation
    To support 90 subnets on a Class B network, we need to determine the number of subnet bits required. In a Class B network, the default subnet mask is 255.255.0.0, which provides 16 bits for the network portion. To support 90 subnets, we need to borrow additional bits from the host portion. By using 7 subnet bits, we can create 128 subnets (2^7) which is more than enough to support 90 subnets. Therefore, the correct answer is 7.

    Rate this question:

  • 43. 

    How many bits are available for host bits on a Class B network using seven bits?

    • A.

      3

    • B.

      5

    • C.

      7

    • D.

      9

    Correct Answer
    D. 9
    Explanation
    A Class B network has a default subnet mask of 16 bits for the network portion and 16 bits for the host portion. However, in this question, it states that only seven bits are being used for the network portion. Therefore, the remaining nine bits are available for the host portion. This means that there are 2^9 or 512 possible host addresses that can be assigned within this Class B network.

    Rate this question:

  • 44. 

    What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

    • A.

      Start with the shortest mask.

    • B.

      Re-address the entire network.

    • C.

      Aim to use contiguous subnets where possible.

    • D.

      Choose one or more available subnets and subnet further.

    Correct Answer
    B. Re-address the entire network.
    Explanation
    Re-addressing the entire network is not a recommendation for planning networks using variable length subnet masking (VLSM). VLSM allows for the creation of subnets with different sizes, so re-addressing the entire network would be unnecessary and time-consuming. It is more efficient to start with the shortest mask, aim to use contiguous subnets where possible, and choose one or more available subnets to subnet further.

    Rate this question:

  • 45. 

    What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?

    • A.

      Auto-sense.

    • B.

      Auto negotiation.

    • C.

      Auto configuration.

    • D.

      Auto summarization.

    Correct Answer
    C. Auto configuration.
    Explanation
    Auto configuration is the mechanism that allows for easier IPv6 address allocations. This process enables devices to automatically assign themselves an IPv6 address without the need for manual configuration or intervention from a network administrator. It simplifies the allocation process and ensures that devices can easily connect to the network and communicate with other devices using IPv6.

    Rate this question:

  • 46. 

    Which one of the following is not an Internet protocol version 6 (IPv6) transition approach?

    • A.

      Translation.

    • B.

      Tunneling.

    • C.

      Dual stack.

    • D.

      Auto configuration.

    Correct Answer
    D. Auto configuration.
    Explanation
    Auto configuration is not an IPv6 transition approach. Auto configuration refers to the process by which IPv6 hosts automatically configure their network interfaces and obtain the necessary network parameters, such as IP address, without manual intervention. It is a feature of IPv6 itself, rather than a specific transition approach. The other options, translation, tunneling, and dual stack, are all valid IPv6 transition approaches used to facilitate the transition from IPv4 to IPv6.

    Rate this question:

  • 47. 

    Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?

    • A.

      6to4.

    • B.

      Teredo.

    • C.

      Tunnel Broker.

    • D.

      Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).

    Correct Answer
    B. Teredo.
    Explanation
    Teredo is an Internet protocol version 6 (IPv6) tunneling approach that attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue. Teredo is designed to allow IPv6 traffic to pass through IPv4 network address translators (NATs) and firewalls by encapsulating IPv6 packets within IPv4 UDP datagrams. This allows devices with only IPv4 connectivity to communicate with IPv6-enabled devices. Teredo uses a client-server architecture and automatically assigns IPv6 addresses to devices.

    Rate this question:

  • 48. 

    Teredo has four tunneling components. Which one is not one of them?

    • A.

      Teredo host-specific relay.

    • B.

      Teredo client.

    • C.

      Teredo server.

    • D.

      Teredo agent.

    Correct Answer
    D. Teredo agent.
    Explanation
    The Teredo protocol is used to enable IPv6 connectivity for devices that are behind NAT devices. It consists of four tunneling components: Teredo host-specific relay, Teredo client, Teredo server, and Teredo agent. The Teredo agent is not one of the components.

    Rate this question:

  • 49. 

    The combination transmitter/receiver device, in a single package, is called a

    • A.

      Transceiver.

    • B.

      Repeater.

    • C.

      Router.

    • D.

      Hub.

    Correct Answer
    A. Transceiver.
    Explanation
    A combination transmitter/receiver device, in a single package, is commonly known as a transceiver. This device is capable of both transmitting and receiving signals, making it a versatile tool for communication purposes. It eliminates the need for separate devices for transmitting and receiving, providing convenience and efficiency. A transceiver is often used in various communication systems, such as telecommunications, wireless networks, and radio frequency applications.

    Rate this question:

  • 50. 

    What device provides the physical, electrical, and electronic connections to the network media?

    • A.

      Bridge.

    • B.

      Router.

    • C.

      Gateway.

    • D.

      Network interface card (NIC).

    Correct Answer
    D. Network interface card (NIC).
    Explanation
    A network interface card (NIC) is a device that provides the physical, electrical, and electronic connections to the network media. It is responsible for connecting a computer or other network-enabled device to the network, allowing it to send and receive data. The NIC acts as an interface between the computer and the network, converting the digital data into electrical signals that can be transmitted over the network media, such as Ethernet cables or wireless connections. Therefore, the NIC is the correct answer as it directly provides the necessary connections to the network media.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 04, 2011
    Quiz Created by
    Woodjh
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.