Computer Networking Basic Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ajeff
A
Ajeff
Community Contributor
Quizzes Created: 39 | Total Attempts: 53,050
Questions: 10 | Attempts: 344

SettingsSettingsSettings
Computer Networking Basic Test - Quiz

Computer networking involves the interconnection of computers and the exchange of data. This quiz provides a basic test for computer networking that will assess your understanding of the topic and provide you with valuable feedback. The quiz contains easy, medium to hard-level questions that are sure to challenge you. If you score well on this test, you are already well versed in the topic. If you find the quiz helpful, share it with others. All the best!


Questions and Answers
  • 1. 

    Barney is a host with IP address 10.1.1.1 in subnet 10.1.1.0/24. Which of the following are things that a standard IP ACL could be configured to do?

    • A.

      Match the exact source IP address

    • B.

      Match IP addresses 10.1.1.1 through 10.1.1.4 with one access-list command without matching other IP addresses

    • C.

      Match all IP addresses in Barney’s subnet with one access-list command without matching other IP addresses

    • D.

      Match only the packet’s destination IP address

    Correct Answer(s)
    A. Match the exact source IP address
    C. Match all IP addresses in Barney’s subnet with one access-list command without matching other IP addresses
    Explanation
    Standard ACLs check the source IP address. The address range 10.1.1.1–10.1.1.4 can be matched by an ACL, but it requires multiple access-list commands.
    Matching all hosts in Barney’s subnet can be accomplished with the access-list 1 permit 10.1.1.0 0.0.0.255 command.

    Rate this question:

  • 2. 

    Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.240.0?

    • A.

      0.0.0.0

    • B.

      0.0.0.31

    • C.

      0.0.0.240

    • D.

      0.0.0.255

    • E.

      0.0.15.255

    Correct Answer
    E. 0.0.15.255
    Explanation
    0.0.15.255 matches all packets with the same first 20 bits. This is useful when you want to match a subnet in which the subnet part comprises the first 20 bits, as in this case.

    Rate this question:

  • 3. 

    Which of the following access-list commands permits traffic that matches packets going to any web client from all web servers whose IP addresses begin with 172.16.5?

    • A.

      Access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www

    • B.

      Access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www

    • C.

      Access-list 2523 permit tcp any eq www 172.16.5.0 0.0.0.255

    • D.

      Access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www 172.16.5.0 0.0.0.255

    • E.

      Access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www any

    Correct Answer
    E. Access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www any
    Explanation
    Because the packet is going toward any web client, you need to check for the web server’s port number as a source port. The client IP address range is not specified in the question, but the servers are, so the source address beginning with 172.16.5 is the correct answer.

    Rate this question:

  • 4. 

    Which of the following fields can be compared using a named extended IP ACL but not a numbered extended IP ACL?

    • A.

      Protocol

    • B.

      Source IP address

    • C.

      Destination IP address

    • D.

      TOS byte

    • E.

      None of the other answers are correct.

    Correct Answer
    E. None of the other answers are correct.
    Explanation
    Named extended IP ACLs can match the exact same set of fields as can numbered extended IP ACLs.

    Rate this question:

  • 5. 

    In which of the following data can be transferred in two directions?

    • A.

      Duplex

    • B.

      Simplex

    • C.

      Triplex

    • D.

      None of the above

    Correct Answer
    A. Duplex
    Explanation
    Duplex refers to a communication system in which data can be transferred in two directions simultaneously. This means that both sending and receiving of data can occur at the same time. In contrast, Simplex allows data to be transferred in only one direction, while Triplex is not a valid option for data transfer. Therefore, the correct answer is Duplex.

    Rate this question:

  • 6. 

    Which of the following has highest speed?

    • A.

      LAN

    • B.

      WAN

    • C.

      MAN

    • D.

      PAN

    Correct Answer
    A. LAN
    Explanation
    LAN stands for Local Area Network, which is a network that covers a small geographical area, typically within a single building or campus. LANs provide high-speed data transfer rates and low latency, making them suitable for applications that require fast communication, such as video streaming or online gaming. WAN (Wide Area Network) covers a larger area, such as multiple buildings or cities, and typically has slower speeds due to the longer distance and more complex infrastructure. MAN (Metropolitan Area Network) is larger than a LAN but smaller than a WAN, and PAN (Personal Area Network) is the smallest, typically covering a person's immediate surroundings. Therefore, LAN has the highest speed among the given options.

    Rate this question:

  • 7. 

    IPv6 has a size of?

    • A.

      128 bits

    • B.

      64 bits

    • C.

      256

    • D.

      None of the above

    Correct Answer
    A. 128 bits
    Explanation
    IPv6 has a size of 128 bits. This means that an IPv6 address is composed of 128 binary digits, allowing for a significantly larger number of unique addresses compared to IPv4. The increased address space in IPv6 is necessary to accommodate the growing number of devices connected to the internet, ensuring that there are enough unique addresses for each device.

    Rate this question:

  • 8. 

    In a router running IOS 12.3, an engineer needs to delete the second line in ACL 101, which currently has four commands configured. Which of the following options could be used?

    • A.

      Delete the entire ACL and reconfigure the three ACL statements that should remain in the ACL.

    • B.

      Delete one line from the ACL using the no access-list... command.

    • C.

      Delete one line from the ACL by entering ACL configuration mode for the ACL and then deleting only the second line based on its sequence number.

    • D.

      Delete the last three lines from the ACL from ACL configuration mode, and then add the last two statements back into the ACL.

    Correct Answer
    A. Delete the entire ACL and reconfigure the three ACL statements that should remain in the ACL.
    Explanation
    Before IOS 12.3, numbered ACLs must be removed and then reconfigured to remove a line from the ACL. As of IOS 12.3, you can also use ACL configuration mode and sequence numbers to delete one ACL line at a time.

    Rate this question:

  • 9. 

    What general guideline should you follow when placing extended IP ACLs?

    • A.

      Perform all filtering on output if at all possible.

    • B.

      Put more-general statements early in the ACL.

    • C.

      Filter packets as close to the source as possible.

    • D.

      Order the ACL commands based on the source IP addresses, lowest to highest, to improve performance.

    Correct Answer
    C. Filter packets as close to the source as possible.
    Explanation
    The authorized Cisco curriculum makes the suggestion in answer C for extended IP ACLs, suggesting that standard ACLs be placed as close to the destination as possible.

    Rate this question:

  • 10. 

    Which of the following tools requires the end user to telnet to a router to gain access to hosts on the other side of the router?

    • A.

      Named ACLs

    • B.

      Reflexive ACLs

    • C.

      Dynamic ACLs

    • D.

      Time-based ACLs

    Correct Answer
    C. Dynamic ACLs
    Explanation
    Dynamic ACLs require the user to telnet to the router and authenticate using a username and password, which then causes the router to permit packets sent by the host.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.