Final Examination (Router Configuration)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bongeagle
B
Bongeagle
Community Contributor
Quizzes Created: 5 | Total Attempts: 33,476
Questions: 30 | Attempts: 1,436

SettingsSettingsSettings
Final Examination (Router Configuration) - Quiz

A router is a device, which is used in networking to help with the distribution of internet within a given area. The router configuration quiz below tests on the different processes and procedures. All the best.


Questions and Answers
  • 1. 

    Which port number is used by SMTP ?

    • A.

      20

    • B.

      23

    • C.

      25

    • D.

      143

    Correct Answer
    C. 25
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages between servers. The correct answer is 25 because port 25 is the default port number used by SMTP for communication. When an email client wants to send an email, it connects to the SMTP server on port 25 to initiate the email transfer process. This port is specifically reserved for SMTP traffic, allowing servers to communicate and relay emails across the internet.

    Rate this question:

  • 2. 

    End system use port numbers to select the proper applications. What is the lowest port number that can be dynamically assigned by the host system ?

    • A.

      1

    • B.

      128

    • C.

      256

    • D.

      1024

    Correct Answer
    A. 1
    Explanation
    End systems use port numbers to select the proper applications. Port numbers range from 0 to 65535, with the first 1024 ports being well-known ports that are reserved for specific services. The lowest port number that can be dynamically assigned by the host system is 1.

    Rate this question:

  • 3. 

    During data transfer, what is the receiving host responsible for ? Choose two

    • A.

      Encapsulation

    • B.

      Bandwidth

    • C.

      Segmentation

    • D.

      Acknowledgement

    • E.

      Reassembly

    Correct Answer(s)
    D. Acknowledgement
    E. Reassembly
    Explanation
    During data transfer, the receiving host is responsible for two things: acknowledgement and reassembly. Acknowledgement refers to the process of confirming that the data has been received successfully by sending a response back to the sender. Reassembly involves reconstructing the received data packets in the correct order to form the original message or file. Both of these tasks are crucial for ensuring reliable and accurate data transfer between the sender and the receiver.

    Rate this question:

  • 4. 

    Which of the following describes the operation of TCP window size?

    • A.

      Window size increases as all data transfers.

    • B.

      Window size is the TCP process used prepare data for transmission.

    • C.

      Window size is decreased if packets are lost.

    • D.

      Window size of 15 means that the next byte expected is byte number 15.

    Correct Answer
    C. Window size is decreased if packets are lost.
    Explanation
    The TCP window size refers to the amount of data that can be sent by the sender without receiving an acknowledgment from the receiver. If packets are lost during transmission, the window size is decreased to prevent further congestion and ensure reliable delivery. This allows the sender to adjust the rate at which it sends data based on the network conditions and the receiver's ability to handle the incoming data.

    Rate this question:

  • 5. 

    What is the purpose of TCP/UDP port numbers ?

    • A.

      To indicate the beginning of a three-way handshake

    • B.

      To reassemble the segments into the correct order

    • C.

      To identify the numbers of the data packets that can be sent without acknowledgment

    • D.

      To track the different conversations crossing the network at the same time

    Correct Answer
    D. To track the different conversations crossing the network at the same time
    Explanation
    TCP/UDP port numbers are used to track the different conversations crossing the network at the same time. Each network connection is assigned a unique port number, which allows the network devices to differentiate between different conversations or applications running simultaneously. By tracking the port numbers, the network can correctly route the incoming data packets to the appropriate application or conversation. This enables multiple applications to communicate over the network concurrently without interference or confusion.

    Rate this question:

  • 6. 

    There are ______ bits in an octet?

    • A.

      8

    • B.

      5

    • C.

      4

    • D.

      9

    Correct Answer
    A. 8
    Explanation
    An octet is a group of 8 bits, so there are 8 bits in an octet.

    Rate this question:

  • 7. 

    Unicast is considered a one to one type of communication ?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Unicast refers to a one-to-one type of communication where data is sent from a single sender to a specific recipient. In this type of communication, the sender and receiver are uniquely identified, and the data is intended for the specific recipient only. Therefore, the statement "Unicast is considered a one-to-one type of communication" is true.

    Rate this question:

  • 8. 

    What does /28 represent in the previous question?

    • A.

      The number of bits in the host portion of the IP address

    • B.

      The number of bits in the network portion of the IP address

    • C.

      The number of hosts in a network

    Correct Answer
    B. The number of bits in the network portion of the IP address
    Explanation
    /28 represents the subnet mask or network prefix length in IP addressing. It indicates that the first 28 bits of the IP address are used to identify the network portion, while the remaining bits are used for the host portion. The subnet mask helps in dividing the IP address into network and host parts, allowing for efficient routing and addressing within a network.

    Rate this question:

  • 9. 

    What is the broadcast address for the network in which 192.168.242.5/20 is located?

    • A.

      192.168.251.251

    • B.

      192.168.250.250

    • C.

      192.168.255.255

    Correct Answer
    C. 192.168.255.255
    Explanation
    The given IP address 192.168.242.5/20 has a subnet mask of 20 bits, which means the first 20 bits of the IP address are the network address and the remaining 12 bits are for host addresses. In this case, the network address is 192.168.240.0. The broadcast address is the highest address in the network, so by setting all the host bits to 1, we get the broadcast address of 192.168.255.255.

    Rate this question:

  • 10. 

    What is the net ID for the network in which 192.168.242.5/20 is located?

    • A.

      192.168.241.1

    • B.

      192.168.240.0

    • C.

      192.168.242.2

    Correct Answer
    B. 192.168.240.0
    Explanation
    The net ID for the network in which 192.168.242.5/20 is located is 192.168.240.0. This is because the /20 subnet mask indicates that the first 20 bits of the IP address are the network portion, leaving the remaining 12 bits for the host portion. Therefore, the network ID is obtained by setting the host portion to all zeros, resulting in 192.168.240.0.

    Rate this question:

  • 11. 

    You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets.  How many hosts per network, and total networks do you get once subnetted.

    • A.

      20 Hosts and 50 Subnets

    • B.

      2 Hosts and 64 Subnets

    • C.

      4 Hosts and 50 Subnets

    • D.

      6 Hosts and 64 Subnets

    Correct Answer
    B. 2 Hosts and 64 Subnets
    Explanation
    193.103.20.0 Need 50 Networks

    128 64 32 16 8 4 2 1

    0 0 1 1 0 0 1 0 = 50 in binary
    Need to borrow 6 bits for # of Networks

    New Subnet Mask = 255.255.255.11111100 (252) or /30
    ^ Increment = 4

    2^6 = # of Networks = 64
    2^2-2 = # of Hosts per Network = 2

    First 5 IP Ranges
    193.103.20.0 - 193.103.20.3
    20.4 – 20.7
    20.8 – 20.11
    20.12 – 20.15
    20.16 – 20.19

    Rate this question:

  • 12. 

    Subnet the Class B IP Address 130.13.0.0 into 500 Subnets.  What is the new Subnet Mask and what is the Increment?

    • A.

      Subnet Mask 255.255.255.0 with an Increment of 2

    • B.

      Subnet Mask 255.255.255.192 with an Increment of 128

    • C.

      Subnet Mask 255.255.255.128 with an Increment of 128

    • D.

      Subnet Mask 255.255.255.128 with an Increment of 64

    Correct Answer
    C. Subnet Mask 255.255.255.128 with an Increment of 128
    Explanation
    130.13.0.0 Need 500 Networks

    128 64 32 16 8 4 2 1 . 128 64 32 16 8 4 2 1

    0 0 0 0 0 0 0 1 . 1 1 1 1 0 1 0 0 = 500 in binary
    Need to borrow 9 bits for # of Networks

    New Subnet Mask = 255.255.11111111.10000000 (255.128) or /25
    ^ Increment = 128

    2^9 = # of Networks = 512
    2^7-2 = # of Hosts per Network = 126

    First 5 IP Ranges
    130.13.0.0 - 130.13.0.127
    13.0.128 – 13.0.255
    13.1.0 – 13.1.127
    13.1.128 – 13.1.255
    13.2.0 – 13.2.127

    Rate this question:

  • 13. 

    Subnet the Address 150.20.0.0 into networks supporting 500 Hosts each.  What is the New Subnet Mask and the IP Address Range of the first Network.

    • A.

      Subnet Mask 255.255.255.0, Range 150.20.0.0 - 150.20.0.255

    • B.

      Subnet Mask 255.255.0.0, Range 150.20.0.0 - 150.20.1.255

    • C.

      Subnet Mask 255.255.255.254, Range 150.20.0.0 - 150.20.255.255

    • D.

      Subnet Mask 255.255.254.0, Range 150.20.0.0 - 150.20.1.255

    Correct Answer
    D. Subnet Mask 255.255.254.0, Range 150.20.0.0 - 150.20.1.255
    Explanation
    150.20.0.0 Need 500 Hosts per Network

    128 64 32 16 8 4 2 1 . 128 64 32 16 8 4 2 1

    0 0 0 0 0 0 0 1 . 1 1 1 1 0 1 0 0 = 500 in binary
    Need to save 9 bits for # of Hosts

    New Subnet Mask = 255.255.11111110.00000000 (254.0) or /23
    ^ Increment = 2 in the 3rd Octet

    2^7 = # of Networks = 128
    2^9-2 = # of Hosts per Network = 510

    First 5 IP Ranges
    150.20.0.0 - 150.20.1.255
    20.2.0 – 20.3.255
    20.4.0 – 20.5.255
    20.6.0 – 20.7.255
    20.8.0 – 20.9.255

    Rate this question:

  • 14. 

    Refer to the exhibit. In this VLSM addressing scheme, what summary address would be sent from router A?

    • A.

      172.16.0.0/16

    • B.

      172.16.0.0/20

    • C.

      172.16.0.0/24

    • D.

      172.32.0.0/16

    Correct Answer
    A. 172.16.0.0/16
    Explanation
    Router A receives 3 subnets: 172.16.64.0/18, 172.16.32.0/24 and 172.16.128.0/18.

    All these 3 subnets have the same form of 172.16.x.x so our summarized subnet must be also in that form -> Only A, B or C is correct.

    The smallest subnet mask of these 3 subnets is /18 so our summarized subnet must also have its subnet mask equal or smaller than /18.

    -> Only answer A has these 2 conditions -> A is correct.

    Rate this question:

  • 15. 

    Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three)

    • A.

      The subnet mask in use is 255.255.255.192.

    • B.

      The LAN interface of the router is configured with one IP address.

    • C.

      The subnet mask in use is 255.255.255.128.

    • D.

      The IP address 172.16.1.25 can be assigned to hosts in VLAN1.

    • E.

      The LAN interface of the router is configured with multiple IP addresses.

    Correct Answer(s)
    C. The subnet mask in use is 255.255.255.128.
    D. The IP address 172.16.1.25 can be assigned to hosts in VLAN1.
    E. The LAN interface of the router is configured with multiple IP addresses.
    Explanation
    VLAN 2 has 114 hosts so we need to leave 7 bits 0 for the host addresses (27 – 2 = 126 > 114). Notice that we are working with class B (both Host A and Host B belong to class B) and the default subnet mask of class B is /16 so we need to use 16 – 7 = 9 bits 1 for the sub-network mask, that means the subnet mask should be 255.255.255.128 -> B is correct.

    By using above scheme, C is correct because the IP 172.16.1.25 belongs to the sub-network of VLAN 1 (172.16.1.0/25) and can be assigned to hosts in VLAN 1.

    For communication between VLAN 1 and VLAN 2, the LAN interface of the router should be divided into multiple sub-interfaces with multiple IP addresses -> F is correct.

    Rate this question:

  • 16. 

    Which layer of the hierarchical network design model is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?

    • A.

      Access Layer

    • B.

      Core Layer

    • C.

      Data Link Layer

    • D.

      Network Layer

    Correct Answer
    B. Core Layer
    Explanation
    The core layer of the hierarchical network design model is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical. This layer is responsible for transporting large amounts of data quickly and efficiently between different parts of the network. It ensures that there is enough bandwidth to support the traffic flow and provides redundancy to ensure uninterrupted connectivity in case of failures.

    Rate this question:

  • 17. 

    Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?

    • A.

      Application

    • B.

      Access

    • C.

      Distribution

    • D.

      Core

    Correct Answer
    B. Access
    Explanation
    The access layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network. This layer is responsible for enforcing security policies, managing user access, and providing connectivity for end devices. It acts as a gateway between the end devices and the rest of the network, allowing only authorized devices to access the network resources.

    Rate this question:

  • 18. 

    Link aggregation should be implemented at which layer of the hierarchical network?

    • A.

      Core only

    • B.

      Distribution and core

    • C.

      Access and distribution

    • D.

      Access, distribution, and core

    Correct Answer
    D. Access, distribution, and core
    Explanation
    Link aggregation should be implemented at the access, distribution, and core layers of the hierarchical network. This is because link aggregation, also known as link bundling or EtherChannel, allows multiple physical links to be combined into a single logical link. By implementing link aggregation at all three layers, the network can benefit from increased bandwidth, improved redundancy, and load balancing across multiple links. This ensures that all layers of the network can handle the aggregated traffic efficiently and effectively.

    Rate this question:

  • 19. 

     

    • A.

      Scalability

    • B.

      Security

    • C.

      Redundancy

    • D.

      Maintainability

    Correct Answer
    C. Redundancy
    Explanation
    Redundancy refers to the duplication of critical components or systems in order to provide backup or failover in case of failure. This ensures that there is no single point of failure and the system can continue to function even if one component fails. Redundancy enhances the reliability and availability of the system. It is an important factor in ensuring continuous operation and minimizing downtime.

    Rate this question:

  • 20. 

    Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?

    • A.

      Application

    • B.

      Access

    • C.

      Distribution

    • D.

      Network

    Correct Answer
    C. Distribution
    Explanation
    The distribution layer in a hierarchical design model controls the flow of network traffic using policies and performs routing functions between virtual LANs (VLANs). This layer helps to separate broadcast domains and provides a centralized point for implementing security policies, filtering traffic, and managing network resources. It acts as an intermediary between the access layer and the core layer, ensuring efficient and scalable network connectivity.

    Rate this question:

  • 21. 

    • A.

      Implement Layer 3 switching on S1 to reduce the packet processing load on D1 and D2. Install all security processing on S1 to reduce network traffic load.

    • B.

      Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to limit access to the HR servers to just the HR subnet.

    • C.

      Move all HR assets out of the data center and connect them to S1. Use Layer 3 security functions on S1 to deny all traffic into and out of S1.

    • D.

      Perform all port access and Layer 3 security functions on C1.

    Correct Answer
    B. Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to limit access to the HR servers to just the HR subnet.
  • 22. 

    Which two features are supported at all three levels of the Cisco three-layer hierarchical model? (Choose two.)

    • A.

      Power over Ethernet

    • B.

      Load balancing across redundant trunk links

    • C.

      Redundant components

    • D.

      Quality of Service

    • E.

      Link aggregation

    Correct Answer(s)
    A. Power over Ethernet
    D. Quality of Service
    E. Link aggregation
    Explanation
    At all three levels of the Cisco three-layer hierarchical model, Power over Ethernet (PoE) is supported. PoE allows devices to receive power and data over the same Ethernet cable, eliminating the need for separate power sources. Quality of Service (QoS) is also supported at all three levels, allowing for prioritization and management of network traffic to ensure optimal performance. Link aggregation, which involves combining multiple physical links into a single logical link, is the third feature supported at all three levels. This helps increase bandwidth and redundancy.

    Rate this question:

  • 23. 

    Configuring communication between devices on different VLANs requires the use of which layer of the OSI model?

    • A.

      Layer 1

    • B.

      Layer 2

    • C.

      Layer 3

    • D.

      Layer 4

    • E.

      Layer 5

    Correct Answer
    C. Layer 3
    Explanation
    Configuring communication between devices on different VLANs requires the use of Layer 3 of the OSI model. Layer 3, also known as the network layer, is responsible for routing and forwarding data packets between different networks. VLANs are virtual LANs that allow for logical segmentation of a network, and to enable communication between devices on different VLANs, a router or Layer 3 switch is required to route the traffic between the VLANs.

    Rate this question:

  • 24. 

    Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?

    • A.

      Layer 1

    • B.

      Layer 2

    • C.

      Layer 3

    • D.

      Layer 4

    Correct Answer
    B. Layer 2
    Explanation
    An access layer LAN switch uses Layer 2 of the OSI model to make a forwarding decision. Layer 2, also known as the Data Link Layer, is responsible for the reliable transfer of data between adjacent network nodes. It uses MAC addresses to identify devices on the network and determines how data is transmitted over the physical network. The access layer switch uses this layer to examine the MAC addresses of incoming frames and make decisions on where to forward them based on the destination MAC address.

    Rate this question:

  • 25. 

    What are three benefits of a hierarchical network model? (Choose three.)

    • A.

      Reduced contention for bandwidth

    • B.

      Reduced size of the physical layout

    • C.

      Increased fault tolerance of the network

    • D.

      Elimination of the need for layer three functionality

    • E.

      Simplification of management and troubleshooting

    Correct Answer(s)
    A. Reduced contention for bandwidth
    C. Increased fault tolerance of the network
    E. Simplification of management and troubleshooting
    Explanation
    The hierarchical network model provides several benefits. Firstly, it reduces contention for bandwidth by dividing the network into smaller segments, allowing for better traffic flow and reducing congestion. Secondly, it increases fault tolerance of the network by providing redundancy at different levels, ensuring that if one component fails, the network can still function. Lastly, it simplifies management and troubleshooting by organizing the network into distinct layers, making it easier to identify and resolve issues.

    Rate this question:

  • 26. 

    Is the transport protocol that manages the individual conversations between web servers and web clients.

    Correct Answer(s)
    Transmission Control Protocol
    TCP
    Explanation
    The given correct answer, Transmission Control Protocol (TCP), is the transport protocol responsible for managing individual conversations between web servers and web clients. TCP ensures reliable and ordered delivery of data packets, establishes and maintains connections, and handles flow control. It breaks down data into smaller packets, sends them across the network, and reassembles them at the receiving end. TCP guarantees that all packets are received and in the correct order, making it suitable for applications like web browsing, file transfer, and email.

    Rate this question:

  • 27. 

    Is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning them the appropriate addresses, and delivering them across the best path to the destination host.

    Correct Answer(s)
    Internet Protocol
    IP
    Explanation
    The correct answer is Internet Protocol (IP) because it is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning them the appropriate addresses, and delivering them across the best path to the destination host. IP is a network layer protocol that provides the addressing and routing functions necessary for data transmission over the internet. It ensures that data is properly packaged and sent to the correct destination, allowing for reliable communication between hosts.

    Rate this question:

  • 28. 

    Consists of a radio transmitter capable of connecting end devices wirelessly

    Correct Answer(s)
    Wireless access point
    Explanation
    A wireless access point is a device that enables end devices to connect to a wireless network. It consists of a radio transmitter that allows for wireless communication between the access point and the end devices. This device acts as a bridge between the wired and wireless networks, providing a wireless connection to devices that do not have built-in wireless capabilities. It allows for seamless connectivity and communication between devices without the need for physical cables.

    Rate this question:

  • 29. 

    Secures outgoing traffic and restricts incoming traffic

    Correct Answer(s)
    Firewall appliance
    Explanation
    A firewall appliance is a device that is used to secure a network by controlling and monitoring incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The firewall appliance secures outgoing traffic by inspecting and filtering the data packets leaving the network, ensuring that only authorized and safe traffic is allowed. It also restricts incoming traffic by examining and blocking any suspicious or potentially harmful traffic from entering the network, thus protecting the internal network from external threats.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 13, 2014
    Quiz Created by
    Bongeagle
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.