CDC 3DX5X Vol2 Ure1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jayhuiz23
J
Jayhuiz23
Community Contributor
Quizzes Created: 11 | Total Attempts: 1,306
Questions: 36 | Attempts: 74

SettingsSettingsSettings
CDC  3DX5X Vol2 Ure1 - Quiz


Use this as a study aid only.


Questions and Answers
  • 1. 

    (201) What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?

    • A.

      Physical

    • B.

      Data Link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    A. Physical
    Explanation
    The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data over the network, including the physical medium, such as cables or wireless signals, and the encoding and decoding of data bits.

    Rate this question:

  • 2. 

    (201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?

    • A.

      High Level Data Link Control and Synchronous Data Link Control.

    • B.

      Logical Link Control and Media Access Control.

    • C.

      Distance Vector and Link State.

    • D.

      RS–232 and RS–530.

    Correct Answer
    B. Logical Link Control and Media Access Control.
    Explanation
    The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for managing communication links and providing error correction. The Media Access Control (MAC) sublayer handles the access to the physical media and controls the transmission of data. These two sublayers work together to ensure reliable and efficient communication between network devices.

    Rate this question:

  • 3. 

    (201) At what Open System Interconnect layer do network switches and bridges operate?

    • A.

      Network.

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    C. Data Link
    Explanation
    Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between network devices over a physical link. Network switches and bridges use MAC addresses to forward data packets within a local area network (LAN). They examine the destination MAC address of incoming packets and forward them only to the appropriate port, improving network efficiency and reducing collisions.

    Rate this question:

  • 4. 

    (201) At what Open System Interconnect layer do routers operate?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    A. Network
    Explanation
    Routers operate at the Network layer of the Open System Interconnect (OSI) model. This layer is responsible for logical addressing and routing of data packets between different networks. Routers use this layer to make decisions on how to forward packets based on the destination IP address. By operating at the Network layer, routers can connect multiple networks and enable communication between them by determining the best path for data transmission.

    Rate this question:

  • 5. 

    (201) At what Open System Interconnect layer are common data compression and encryption schemes used?

    • A.

      Application

    • B.

      Session

    • C.

      Presentation

    • D.

      Transport

    Correct Answer
    C. Presentation
    Explanation
    Data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. This layer is responsible for formatting and presenting data in a way that can be understood by the application layer. Data compression reduces the size of the data, making it more efficient to transmit, while encryption ensures the security and confidentiality of the data. Therefore, both these techniques are commonly implemented at the Presentation layer.

    Rate this question:

  • 6. 

    (201) What Open System Interconnect layer is closest to the end user?

    • A.

      Application.

    • B.

      Session

    • C.

      Presentation

    • D.

      Transport

    Correct Answer
    A. Application.
    Explanation
    The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with the user and serves as the interface between the user and the network. The other layers (Session, Presentation, and Transport) are responsible for tasks such as establishing connections, data formatting, and reliable data transfer, but they are not directly involved in user interactions.

    Rate this question:

  • 7. 

    (201) What is a formal set of rules and conventions that govern how computers exchange information over a network medium?

    • A.

      Specification.

    • B.

      Standard

    • C.

      Etiquette

    • D.

      Protocol

    Correct Answer
    D. Protocol
    Explanation
    A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that devices can communicate effectively and understand each other's messages, allowing for reliable and efficient data exchange.

    Rate this question:

  • 8. 

    (202) What topology defines the layout of a network’s devices and media?

    • A.

      Physical

    • B.

      Logical

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    A. Physical
    Explanation
    The correct answer is Physical. The topology of a network refers to the arrangement of its devices and media. This includes the physical layout and connections between devices, such as how they are physically connected using cables or wireless connections. The physical topology determines how devices are physically arranged and connected to each other in a network, such as in a bus, ring, star, or mesh configuration.

    Rate this question:

  • 9. 

    (202) What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

    • A.

      Physical

    • B.

      Logical

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    B. Logical
    Explanation
    The correct answer is Logical. Logical topology refers to the way in which devices communicate and data is transmitted in a network. It defines the logical connections between devices, regardless of their physical locations. This includes the paths that data takes from one device to another, the protocols used for communication, and the logical organization of the network.

    Rate this question:

  • 10. 

    (202) What topology consists of devices connected to a common, shared cable?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    A. Bus
    Explanation
    A bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable, which acts as a backbone. Each device on the bus network can transmit data and receive data from the cable. The advantage of a bus topology is that it is simple and cost-effective to implement, as it requires less cabling compared to other topologies. However, a disadvantage is that if the cable fails, the entire network can be affected.

    Rate this question:

  • 11. 

    (202) What topology consists of cable segments from each computer connected to a centralized component?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    C. Star
    Explanation
    A star topology consists of cable segments from each computer connected to a centralized component, typically a switch or hub. In this configuration, all the devices are connected to a central point, allowing for easy management and troubleshooting. Each device has its own dedicated connection to the central component, which provides better performance and reliability compared to other topologies like bus or ring. This topology also allows for easy expansion and scalability as new devices can be added without affecting the existing connections.

    Rate this question:

  • 12. 

    (202) What topology combines two or more different physical topologies in a single network?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    D. Hybrid
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that the network can have a combination of bus, ring, star, or any other topology. In a hybrid topology, different sections of the network may use different topologies depending on the requirements of that section. This allows for flexibility and scalability in the network design, as different sections can be configured to suit their specific needs.

    Rate this question:

  • 13. 

    (203) Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?

    • A.

      AppleTalk

    • B.

      NetBios Extended User Interface.

    • C.

      Transport Control Protocol/Internet Protocol.

    • D.

      Internetwork Packet Exchange/ Sequenced Packet Exchange.

    Correct Answer
    C. Transport Control Protocol/Internet Protocol.
    Explanation
    The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for the reliable transmission of data over networks, including the internet. It is widely used and provides a robust and scalable solution for networking, making it a suitable choice for the Department of Defense's needs.

    Rate this question:

  • 14. 

    (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol.

    • C.

      Reverse Address Resolution Protocol.

    • D.

      Internet Control Message Protocol.

    Correct Answer
    B. Address Resolution Protocol.
    Explanation
    The correct answer is Address Resolution Protocol. The Address Resolution Protocol (ARP) is responsible for mapping an IP address to a MAC address in a local network. When a device wants to send data to another device in the same network, it needs to know the MAC address of the destination device. ARP helps in this process by sending out an ARP request to all devices in the network, asking for the MAC address associated with a specific IP address. The device with the matching IP address responds with its MAC address, allowing the sender to establish a connection and send data.

    Rate this question:

  • 15. 

    (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

    • A.

      Internet Protocol.

    • B.

      Address Resolution Protocol.

    • C.

      Reverse Address Resolution Protocol.

    • D.

      Internet Control Message Protocol.

    Correct Answer
    C. Reverse Address Resolution Protocol.
    Explanation
    Reverse Address Resolution Protocol (RARP) is the correct answer because it is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request the corresponding IP address. This is useful in scenarios where a device does not have a preconfigured IP address and needs to obtain one dynamically.

    Rate this question:

  • 16. 

    (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?

    • A.

      Internet Protocol.

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resolution Protocol.

    • D.

      Internet Control Message Protocol.

    Correct Answer
    D. Internet Control Message Protocol.
    Explanation
    The correct answer is Internet Control Message Protocol. Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging for troubleshooting purposes. It allows network devices to send error messages and operational information to indicate any issues or errors encountered during data transmission. ICMP messages can be used to diagnose network connectivity problems, determine the availability of network services, and troubleshoot network configuration issues.

    Rate this question:

  • 17. 

    (203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

    • A.

      Internet Protocol.

    • B.

      User Datagram Protocol.

    • C.

      Transmission Control Protocol.

    • D.

      Internet Control Message Protocol.

    Correct Answer
    C. Transmission Control Protocol.
    Explanation
    The correct answer is Transmission Control Protocol. TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors by using acknowledgment mechanisms, flow control, and error detection and correction. TCP is widely used in applications that require reliable and ordered delivery of data, such as web browsing, file transfer, and email.

    Rate this question:

  • 18. 

    (203) What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

    • A.

      File Transfer Protocol.

    • B.

      Trivial File Transfer Protocol.

    • C.

      Simple Mail Transfer Protocol.

    • D.

      HyperText Transfer Protocol.

    Correct Answer
    A. File Transfer Protocol.
    Explanation
    The correct answer is File Transfer Protocol (FTP). FTP is specifically designed for sending and receiving files over a TCP/IP network. It provides a standard set of commands for accessing and transferring files between computers. FTP is widely used for uploading files to a website, downloading files from a server, and transferring files between computers on a network. It ensures reliable and secure file transfer by using TCP as the underlying protocol. Trivial File Transfer Protocol (TFTP) is a simpler version of FTP, but it does not provide the same level of functionality and security. Simple Mail Transfer Protocol (SMTP) is used for sending emails, and HyperText Transfer Protocol (HTTP) is used for transferring web pages.

    Rate this question:

  • 19. 

    (204) What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

    • A.

      Local Area Network.

    • B.

      Wide Area Network.

    • C.

      Virtual Private Network.

    • D.

      Metropolitan Area Network.

    Correct Answer
    B. Wide Area Network.
    Explanation
    A Wide Area Network (WAN) is the correct answer because it connects networks that are separated by geographical distances, such as between cities, states, countries, or even around the world. Unlike a Local Area Network (LAN) which connects devices within a limited area, a WAN allows for communication and data transfer over long distances. Other options like Virtual Private Network (VPN) and Metropolitan Area Network (MAN) may also connect networks, but they are not specifically designed for long-distance connections like a WAN.

    Rate this question:

  • 20. 

    (204) What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

    • A.

      Local Area Network.

    • B.

      Wide Area Network.

    • C.

      Virtual Private Network

    • D.

      Metropolitan Area Network.

    Correct Answer
    C. Virtual Private Network
    Explanation
    A Virtual Private Network (VPN) is a type of network that utilizes tunneling and security protocols to allow a group of two or more computer systems to communicate over the public Internet. It creates a secure and encrypted connection between the systems, ensuring that the data transmitted between them remains private and protected from unauthorized access. VPNs are commonly used by businesses and individuals to establish secure connections and access resources remotely, providing a level of privacy and security that is not possible with a Local Area Network or a Wide Area Network.

    Rate this question:

  • 21. 

    (204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

    • A.

      Port 80

    • B.

      Port 110

    • C.

      Port 443

    • D.

      Port 8080

    Correct Answer
    D. Port 8080
    Explanation
    Port 8080 is a common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. While the default port for HTTP is 80, port 8080 is often used as an alternative port for HTTP. It is commonly used for testing or running web servers on non-standard ports, allowing developers to run multiple web servers on the same machine. This port is also used for proxy servers, which act as intermediaries between clients and servers, forwarding HTTP requests and responses.

    Rate this question:

  • 22. 

    (205) How many bits are in an IPv4 address?

    • A.

      16 bits

    • B.

      32 bits

    • C.

      64 bits

    • D.

      128 bits

    Correct Answer
    B. 32 bits
    Explanation
    An IPv4 address is a 32-bit address used to identify devices on a network. This means that there are 32 bits in an IPv4 address. Each bit can have a value of either 0 or 1, resulting in a total of 2^32 possible unique addresses.

    Rate this question:

  • 23. 

    (205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format.

    • B.

      Dotted Decimal Notation.

    • C.

      Hexadecimal.

    • D.

      Octal.

    Correct Answer
    B. Dotted Decimal Notation.
    Explanation
    IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four parts, each separated by a dot. Each part represents a decimal value ranging from 0 to 255, making it easier for users to read and remember. This format is widely used and understood, allowing users to easily identify and communicate IP addresses.

    Rate this question:

  • 24. 

    (205) Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    A. Class A
    Explanation
    An IPv4 address is divided into different classes based on the range of the first octet. In this case, the range is given as 1-126, which falls within the range of Class A addresses. Class A addresses have the first bit set to 0, indicating that the network portion of the address is in the first octet. This allows for a large number of networks with a smaller number of hosts per network.

    Rate this question:

  • 25. 

    (205) What IPv4 class address is used for networks with about 250 nodes?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    A. Class C
    Explanation
    Class C is the correct answer because it is the class of IPv4 addresses that is typically used for small to medium-sized networks. Class C addresses have a default subnet mask of 255.255.255.0, which allows for up to 254 usable host addresses. Since the question states that the network has about 250 nodes, Class C would be the most appropriate choice. Class D is used for multicast addresses, Class E is reserved for experimental use, and Class F is currently unassigned.

    Rate this question:

  • 26. 

    (205) What IPv4 class address is used for multicast addressing?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    B. Class D
    Explanation
    Class D is the correct answer because it is the class of IPv4 addresses specifically reserved for multicast addressing. Multicast is a method of sending network packets to a group of devices simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are used for applications like video streaming, online gaming, and audio conferencing where data needs to be distributed to multiple recipients.

    Rate this question:

  • 27. 

    (205) What IPv4 reserved address is used for loop back?

    • A.

      0.0.0.0

    • B.

      127.0.0.1

    • C.

      207.55.157.255

    • D.

      255.255.255.255

    Correct Answer
    B. 127.0.0.1
    Explanation
    The IPv4 reserved address used for loop back is 127.0.0.1. This address is reserved for the loopback interface, which allows a device to send network traffic to itself. When a device sends traffic to 127.0.0.1, it is looped back internally and does not leave the device. This is commonly used for testing and troubleshooting network connectivity on a local machine.

    Rate this question:

  • 28. 

    (205) What is a mechanism that allows a network device to divide an IP address into a network and host number?

    • A.

      Subnet mask

    • B.

      Broadcast

    • C.

      Multicast

    • D.

      Subnet

    Correct Answer
    A. Subnet mask
    Explanation
    A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is a 32-bit number that is used to identify the network portion of an IP address. By using a subnet mask, the device can determine which part of the IP address belongs to the network and which part belongs to the host. This division is essential for routing and forwarding packets within a network.

    Rate this question:

  • 29. 

    (205) What is the default classful subnet mask on class B networks?

    • A.

      255.255.0.0

    • B.

      255.255.240.0

    • C.

      255.255.255.0

    • D.

      255.255.255.224

    Correct Answer
    A. 255.255.0.0
    Explanation
    The default classful subnet mask for class B networks is 255.255.0.0. Class B networks have a default subnet mask of 255.255.0.0, which means that the network portion of the IP address is the first two octets and the host portion is the last two octets. This allows for a maximum of 65,534 hosts per network.

    Rate this question:

  • 30. 

    (205) What method borrows bits from the host field of an IP address to create a subnet?

    • A.

      Classful Subnet Masking.

    • B.

      Classless Inter-Domain Routing.

    • C.

      Virtual Private Networking.

    • D.

      Virtual Local Area Networking.

    Correct Answer
    B. Classless Inter-Domain Routing.
    Explanation
    Classless Inter-Domain Routing (CIDR) is a method that borrows bits from the host field of an IP address to create a subnet. It allows for more flexible and efficient allocation of IP addresses by allowing variable-length subnet masks. This means that instead of being restricted to the fixed subnet masks used in classful subnet masking, CIDR allows for the creation of subnets of different sizes based on the specific needs of the network. This helps to conserve IP address space and improve network scalability.

    Rate this question:

  • 31. 

    (206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format.

    • B.

      Dotted Decimal Notation

    • C.

      Hexadecimal

    • D.

      Octal

    Correct Answer
    A. Colon Hexadecimal Format.
    Explanation
    IPv6 addresses are expressed in colon hexadecimal format to make them more user-friendly. In this format, the address is divided into eight groups of four hexadecimal digits, separated by colons. This format allows for a larger address space compared to IPv4, which uses dotted decimal notation. The use of hexadecimal makes it easier for users to read and remember the addresses. Octal and binary formats are not used for IPv6 addresses.

    Rate this question:

  • 32. 

    (206) What notation is expressed in leading zero compression for IPv6?

    • A.

      1234:1234:0:0:1234:0:0:1234.

    • B.

      10AB::3:0:1234:5678.

    • C.

      255.255.255.255.

    • D.

      127.0.0.1.

    Correct Answer
    A. 1234:1234:0:0:1234:0:0:1234.
    Explanation
    Leading zero compression is a notation used in IPv6 to simplify the representation of consecutive blocks of zeros. It allows for the omission of one or more consecutive blocks of zeros, replacing them with a double colon "::". In the given answer, the notation "1234:1234:0:0:1234:0:0:1234" represents leading zero compression because it contains consecutive blocks of zeros that have been compressed using the "::" notation.

    Rate this question:

  • 33. 

    (206) What notation is expressed in zero compression for IPv6?

    • A.

      1234:1234:0:0:1234:0:0:1234.

    • B.

      10AB::3:0:1234:5678.

    • C.

      255.255.255.255.

    • D.

      127.0.0.1.

    Correct Answer
    B. 10AB::3:0:1234:5678.
    Explanation
    The correct answer is 10AB::3:0:1234:5678. This notation represents zero compression in IPv6. In IPv6, consecutive blocks of zeros can be compressed by using a double colon (::) to represent multiple blocks of zeros. In this notation, the double colon is used to compress two blocks of zeros, resulting in a shorter representation of the IPv6 address.

    Rate this question:

  • 34. 

    (206) What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregateable Local

    • D.

      Aggregatable Global

    Correct Answer
    B. Link-local
    Explanation
    Link-local addresses are used for communication within a network segment and do not require a router to direct traffic. These addresses are automatically assigned to interfaces and are only valid within the local network. They are not routable and cannot be used to communicate with devices outside of the network segment. Therefore, link-local addresses operate within a network segment and do not originate from, or be destined to, an interface that requires a router.

    Rate this question:

  • 35. 

    (206) What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    A. Site-local
    Explanation
    Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique. Site-local addresses were deprecated in favor of Unique Local Addresses (ULA) by RFC 4193, but they are still used in some legacy systems. They provide a way for organizations to have private addressing within their network without the need for global routing.

    Rate this question:

  • 36. 

    (206) What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    D. Aggregatable Global
    Explanation
    Aggregatable Global is the correct answer because it refers to the unicast address scope that is publicly accessible, with the Network ID portion of the address broken up into different areas. This allows for hierarchical design and allocation, meaning that the address can be divided into smaller subnets or areas for more efficient routing and management. Aggregatable Global addresses are routable on the public internet and are designed to support global connectivity.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 18, 2013
    Quiz Created by
    Jayhuiz23
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.