3DX7X Vol 1: Unit 4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Denise Buffoni
D
Denise Buffoni
Community Contributor
Quizzes Created: 8 | Total Attempts: 3,559
Questions: 18 | Attempts: 292

SettingsSettingsSettings
3DX7X Vol 1: Unit 4 - Quiz

Network Fundamentals


Questions and Answers
  • 1. 

    Network switches and bridges operate at what Open System Interconnect (OSI) layer?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    C. Data Link
    Explanation
    Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes, ensuring error-free transmission and managing the flow of data. Switches and bridges use the MAC addresses of devices to forward data packets within a local area network (LAN), making them essential components for network connectivity and communication.

    Rate this question:

  • 2. 

    The Institute of Electrical and Electronics Engineers (IEEE) divides the Open System Interconnect (OSI) Data Link Layers into what two sublayers?

    • A.

      High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC)

    • B.

      Logical Link Control (LLC) and Media Access Control (MAC)

    • C.

      Distance Vector and Link State

    • D.

      RS-232 and RS-530

    Correct Answer
    B. Logical Link Control (LLC) and Media Access Control (MAC)
    Explanation
    The correct answer is Logical Link Control (LLC) and Media Access Control (MAC). The OSI Data Link Layer is divided into these two sublayers to handle different functions. The LLC sublayer is responsible for flow control, error checking, and framing of data, while the MAC sublayer is responsible for controlling access to the physical media and managing the transmission of data. This division allows for efficient and reliable communication between devices in a network.

    Rate this question:

  • 3. 

    Routers operate at what Open System Interconnect (OSI) layer?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    A. Network
    Explanation
    Routers operate at the Network layer of the OSI model. This layer is responsible for logical addressing, routing, and forwarding of data packets across different networks. Routers use IP addresses to determine the best path for data transmission and make decisions on how to forward packets to their destination. They analyze network layer headers and make decisions based on the information in those headers. By operating at the Network layer, routers enable communication between different networks and play a crucial role in the functioning of the internet.

    Rate this question:

  • 4. 

    Virtual circuits are established, maintained, and terminated at what Open System Interconnect (OSI) layer?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    Virtual circuits are established, maintained, and terminated at the Transport layer of the Open System Interconnect (OSI) model. The Transport layer is responsible for ensuring reliable and orderly delivery of data between end systems. It establishes virtual circuits, which are logical connections between sender and receiver, to provide reliable and error-free communication. The Transport layer also handles flow control, segmentation, reassembly, and error recovery, making it the appropriate layer for managing virtual circuits.

    Rate this question:

  • 5. 

    What is the combat information technology (IT) communication support agency of the DoD called?

    • A.

      Defense Intelligence Agency

    • B.

      Defense Information System Agency

    • C.

      Defense Information Systems Network

    • D.

      Department of Defense Information Networks

    Correct Answer
    B. Defense Information System Agency
    Explanation
    The correct answer is Defense Information System Agency. The Defense Information System Agency (DISA) is the combat information technology (IT) communication support agency of the Department of Defense (DoD). DISA is responsible for providing and managing IT and communication support to the military services, combatant commands, and other DoD components. It ensures that the DoD has a reliable and secure information infrastructure to support military operations and decision-making.

    Rate this question:

  • 6. 

    Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service?

    • A.

      The customer

    • B.

      Security Manager

    • C.

      National Security Agency

    • D.

      Communications Squadron

    Correct Answer
    A. The customer
    Explanation
    The customer is responsible for providing encryption devices for connection to the Secret Internet Protocol (IP) Data service. This means that it is the customer's responsibility to ensure that they have the necessary encryption devices in order to establish a secure connection to the service. The other options, such as the Security Manager, National Security Agency, and Communications Squadron, are not responsible for providing encryption devices in this context.

    Rate this question:

  • 7. 

    What are the two classifications of transport protocols?

    • A.

      Connection Oriented and Connectionless Oriented

    • B.

      Classful and Connectionless Oriented

    • C.

      Connectionless Oriented and Classless

    • D.

      Classful and Classless

    Correct Answer
    A. Connection Oriented and Connectionless Oriented
    Explanation
    The two classifications of transport protocols are connection-oriented and connectionless-oriented. Connection-oriented protocols establish a reliable and dedicated connection between the sender and receiver before transmitting data, ensuring data integrity and order. Connectionless-oriented protocols do not establish a dedicated connection and instead send data packets individually, without guaranteeing reliability or order.

    Rate this question:

  • 8. 

    In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what must happen before data is transmitted between clients?

    • A.

      Authorization

    • B.

      Connection establishment

    • C.

      Establishment of a clear channel

    • D.

      End-to-end connectivity between host applications

    Correct Answer
    B. Connection establishment
    Explanation
    Before data is transmitted between clients in a connection-oriented protocol like TCP, the connection must be established. This involves a handshake process where the client and server exchange messages to set up a reliable connection. This ensures that both parties are ready to send and receive data and establishes a reliable communication channel. Once the connection is established, data can be transmitted between the clients.

    Rate this question:

  • 9. 

    What regulates how much information passes over a Transmission Control Protocol (TCP) connection before the receiving host must send an acknowledgement?

    • A.

      Data receive message

    • B.

      Sliding Window

    • C.

      Buffer

    • D.

      Socket

    Correct Answer
    B. Sliding Window
    Explanation
    The sliding window is a mechanism that regulates how much data can be sent over a TCP connection before receiving an acknowledgement. It allows the sender to transmit a certain amount of data without waiting for individual acknowledgements for each packet. The size of the sliding window determines the number of packets that can be sent before an acknowledgement is required. As acknowledgements are received, the window slides forward, allowing more data to be sent. This helps to optimize the transmission process and improve overall network efficiency.

    Rate this question:

  • 10. 

    Which of these lists the fields in the User Datagram Protocol (UDP) segment?

    • A.

      Source Port, Destination Port, Length, Checksum, Data

    • B.

      Source Port, Destination Port, Length, Windowing, Data

    • C.

      Source Port, Destination Port, Length, Acknowledgement, Data

    • D.

      Channel Clear, Source Port, Destination Port, Length, Checksum, Data

    Correct Answer
    A. Source Port, Destination Port, Length, Checksum, Data
    Explanation
    The User Datagram Protocol (UDP) segment is composed of the following fields: Source Port, Destination Port, Length, Checksum, and Data. These fields are used to identify the source and destination ports, determine the length of the segment, verify data integrity with the checksum, and carry the actual data being transmitted. The other options listed do not include the correct combination of fields for a UDP segment.

    Rate this question:

  • 11. 

    How many bits are in an Internet Protocol version 4 (IPv4) address?

    • A.

      16

    • B.

      32

    • C.

      64

    • D.

      128

    Correct Answer
    B. 32
    Explanation
    An Internet Protocol version 4 (IPv4) address consists of 32 bits. This means that it is composed of a sequence of 32 binary digits, which are used to uniquely identify devices on a network. Each bit can be either a 0 or a 1, resulting in a total of 2^32 (or approximately 4.3 billion) possible IPv4 addresses.

    Rate this question:

  • 12. 

    What class uses a range of 1-126 in the first octet of an Internet Protocol version 4 (IPv4)?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    A. Class A
    Explanation
    Class A uses a range of 1-126 in the first octet of an IPv4 address. This class is used for large networks, as it provides a large number of unique IP addresses. The remaining three octets in the address can be used to identify specific hosts within the network. Class A addresses are typically assigned to organizations that require a large number of IP addresses, such as major corporations or internet service providers.

    Rate this question:

  • 13. 

    What Internet Protocol version 4 (IPv4) class address is used for networks with about 250 nodes?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    A. Class C
    Explanation
    Class C addresses are used for networks with approximately 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255, with the first octet ranging from 192 to 223. This allows for a total of 2^24 (16,777,216) unique IP addresses, which is sufficient for networks with around 250 nodes. Class D addresses are used for multicast addresses, Class E addresses are reserved for experimental use, and Class F addresses are reserved for future use.

    Rate this question:

  • 14. 

    What Internet Protocol version 4 (IPv4) class address is used for multicast addressing?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    B. Class D
    Explanation
    Class D is the correct answer because it is the Internet Protocol version 4 (IPv4) class address used for multicast addressing. Multicast addressing allows a single packet to be sent to multiple hosts simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved for multicast group addresses.

    Rate this question:

  • 15. 

    What Internet Protocol version 4 (IPv4) reserved address is used for loop back?

    • A.

      0.0.0.0

    • B.

      127.0.0.1

    • C.

      207.55.157.255

    • D.

      255.255.255.255

    Correct Answer
    B. 127.0.0.1
    Explanation
    The correct answer is 127.0.0.1. This address is reserved for loopback testing, which means that any data sent to this address is immediately returned back to the sender without being transmitted over the network. It is commonly used for testing network software or diagnosing network issues on a local machine.

    Rate this question:

  • 16. 

    Instead of using binary, how are Internet Protocol version 6 (IPv6) addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format

    • B.

      Dotted Decimal Notation

    • C.

      Hexadecimal

    • D.

      Octal

    Correct Answer
    A. Colon Hexadecimal Format
    Explanation
    IPv6 addresses are expressed in a user-friendly manner using the colon hexadecimal format. In this format, the 128-bit IPv6 address is divided into eight 16-bit blocks, separated by colons. Each block is represented by four hexadecimal digits, making it easier for users to read and remember. This format allows for a larger address space compared to the previous IPv4 format, which used dotted decimal notation.

    Rate this question:

  • 17. 

    The range of well-known port numbers is

    • A.

      1024 to 49151

    • B.

      49152 to 65535

    • C.

      0 to 1023

    • D.

      0 to 1024

    Correct Answer
    C. 0 to 1023
    Explanation
    The range of well-known port numbers is 0 to 1023. This range is reserved for specific services or protocols that are commonly used and well-known. Ports within this range are assigned by the Internet Assigned Numbers Authority (IANA) and are typically associated with standard services such as HTTP (port 80), FTP (port 21), and SSH (port 22). These port numbers are widely recognized and used by various networking applications and protocols.

    Rate this question:

  • 18. 

    Which common port contains Hyper Text Transfer Protocol (HTTP) servers and proxies?

    • A.

      Port 80

    • B.

      Port 110

    • C.

      Port 443

    • D.

      Port 8080

    Correct Answer
    D. Port 8080
    Explanation
    Port 8080 is commonly used for HTTP servers and proxies. While port 80 is the default port for HTTP, port 8080 is often used as an alternative or backup port. It is commonly used for testing or running web servers on non-standard ports. Additionally, some proxies also use port 8080 to handle HTTP traffic. Ports 110 and 443 are not commonly associated with HTTP servers and proxies.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 12, 2017
    Quiz Created by
    Denise Buffoni
Back to Top Back to top
Advertisement