‘authenticate’ Your Networking Knowledge

15 Questions | Total Attempts: 57

Settings
Please wait...
authenticate Your Networking Knowledge

SDM Magazine 5-Minute Tech Quiz, November 2013


Questions and Answers
  • 1. 
    A MAC address is comprised of _____ sets of numbers that identify _____
    • A. 

      4; the computer.

    • B. 

      4; the manufacturer, ISP, transmission method, and device.

    • C. 

      2; the manufacturer and the device.

    • D. 

      1; the devices’ serial number.

  • 2. 
    In programming a device, the number is created by activating switches representing numbers from
    • A. 

      2 to 256.

    • B. 

      1 to 128.

    • C. 

      0 to 256.

    • D. 

      1 to 999.

  • 3. 
    Standards for networking are created by
    • A. 

      ANSI.

    • B. 

      NFPA.

    • C. 

      IEEE.

    • D. 

      ASIS.

    • E. 

      UL.

  • 4. 
    The seven-layer model defines how everything from hardware to software is supposed to work in a network.
    • A. 

      True

    • B. 

      False

  • 5. 
    The lower levels of the OSI networking model are _____ protocols, and the upper levels deal primarily with _____
    • A. 

      Lower-number octets; higher-number octets above 255.

    • B. 

      Hardware-centric; software.

    • C. 

      ISP; internal addressing.

    • D. 

      Security; authentication.

  • 6. 
    An IP address consists of _____ sets of numbers.
    • A. 

      2

    • B. 

      4

    • C. 

      6

    • D. 

      8

  • 7. 
    The purchaser of the network device must program the MAC address into the device prior to activating it.
    • A. 

      True

    • B. 

      False

  • 8. 
    Which of the following is not a type of protocol?
    • A. 

      TCP

    • B. 

      UDP

    • C. 

      RSP

    • D. 

      IP

    • E. 

      DHCP

  • 9. 
    A MAC address is _____ bits long, written as _____ pairs of hexadecimal digits.
    • A. 

      8; 24

    • B. 

      8; 24

    • C. 

      4; 15

    • D. 

      255; 8

  • 10. 
    An IP address is _____ bits long and written as _____ numbers in a “dotted-decimal-notation” format.
    • A. 

      32; 4

    • B. 

      16; 6

    • C. 

      128; 8

    • D. 

      255; 8

  • 11. 
    MAC addresses are used for network routing.
    • A. 

      True

    • B. 

      False

  • 12. 
    IP addresses are assigned to the computer by the _____ as a static address or automatically using _____.
    • A. 

      Manufacturer; random number generation

    • B. 

      Network administration; DHCP

    • C. 

      ISP; the serial number

    • D. 

      Any of the above

    • E. 

      None of the above

  • 13. 
    A NAT is
    • A. 

      The National Addressing Team.

    • B. 

      A bug.

    • C. 

      The National Assignment Transmitter.

    • D. 

      The Network Address Translator.

  • 14. 
    A(n) _____ has a(n) _____ address programmed into it when manufactured.
    • A. 

      IP; NAT

    • B. 

      NIC; DNS

    • C. 

      NAT; TCP

    • D. 

      NIC; MAC

  • 15. 
    SSL authentication is a two-way communication method.
    • A. 

      True

    • B. 

      False