CISCO CCNA - Book 1, Chapter 5

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By JRoadkill
J
JRoadkill
Community Contributor
Quizzes Created: 4 | Total Attempts: 2,517
Questions: 37 | Attempts: 538

SettingsSettingsSettings
CISCO CCNA - Book 1, Chapter 5 - Quiz

OSI Network Layer
The method described by the network layer for routing packets from a device on one network to a device on a different network How the Internet Protocol (IP) works at the network layer to provide connectionless, best-effort service to the upper layers of the OSI model How devices are grouped into physical and logical networks How the heirarchical addresses of devices allow communication between networks How routers use next-hop addresses to select a path for packets to reach their destination How routers forward packets


Questions and Answers
  • 1. 

    Refer to the exhibit. A network administrator notices that there are too many broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two)

    • A.

      Replace S2 with a router

    • B.

      Place all servers on S1

    • C.

      Disable TCP/IP broadcasts

    • D.

      Subnet the 192.168.0.0 /24 network

    • E.

      Disable all unused interfaces on the switches

    Correct Answer(s)
    A. Replace S2 with a router
    D. Subnet the 192.168.0.0 /24 network
    Explanation
    The network administrator can take two steps to resolve the problem of too many broadcasts on the network. Firstly, they can replace S2 with a router. Routers can help to segment the network into separate broadcast domains, reducing the number of broadcasts that reach all devices on the network. Secondly, they can subnet the 192.168.0.0 /24 network. Subnetting allows for the creation of smaller, more efficient subnetworks, which can help to reduce the number of broadcasts by limiting their reach to specific subnets.

    Rate this question:

  • 2. 

    Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choose two)

    • A.

      192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network

    • B.

      10.0.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 10.0.0.0 network

    • C.

      192.168.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 172.16.0.0 network

    • D.

      172.16.0.1 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 to the 172.16.0.0 network

    • E.

      192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network

    • F.

      192.168.0.2 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network

    Correct Answer(s)
    A. 192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network
    E. 192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network
    Explanation
    The correct answer states that 192.168.0.2 is the next-hop address used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network. This means that R3 will forward any packets destined for the 172.16.0.0 network to the next-hop address of 192.168.0.2. Similarly, the answer also states that 192.168.0.1 is the next-hop address used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network. This means that R2 will forward any packets destined for the 192.168.12.0 network to the next-hop address of 192.168.0.1.

    Rate this question:

  • 3. 

    Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?

    • A.

      192.135.250.1

    • B.

      192.31.7.1

    • C.

      192.133.219.0

    • D.

      192.133.219.1

    Correct Answer
    D. 192.133.219.1
    Explanation
    The default gateway address for host A in the 192.133.219.0 network would be 192.133.219.1.

    Rate this question:

  • 4. 

    • A.

      3

    • B.

      4

    • C.

      5

    • D.

      7

    • E.

      8

    • F.

      11

    Correct Answer
    B. 4
  • 5. 

    Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the administrator would identify which address as the address to which all hosts send packets that are destined for an outside network?

    • A.

      10.10.10.26

    • B.

      127.0.0.1

    • C.

      10.10.10.6

    • D.

      10.10.10.1

    • E.

      224.0.0.0

    Correct Answer
    C. 10.10.10.6
    Explanation
    The correct answer is 10.10.10.6. This address is the default gateway, which is the address that all hosts on the network send packets to when they are destined for an outside network. The default gateway is responsible for forwarding these packets to the appropriate destination.

    Rate this question:

  • 6. 

    In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?

    • A.

      Destination network address

    • B.

      Source network address

    • C.

      Source MAC address

    • D.

      Well known port destination address

    Correct Answer
    A. Destination network address
    Explanation
    The router uses the destination network address to forward data packets from one interface to another. The destination network address helps the router determine the next hop or the next router to which the packet should be sent in order to reach its intended destination. By examining the destination network address, the router can make forwarding decisions based on its routing table and determine the most appropriate path for the packet to take.

    Rate this question:

  • 7. 

    What information is added during encapsulation at OSI Layer 3?

    • A.

      Source and destination MAC

    • B.

      Source and destination application protocol

    • C.

      Source and destination port number

    • D.

      Source and destination IP address

    Correct Answer
    D. Source and destination IP address
    Explanation
    During encapsulation at OSI Layer 3, the source and destination IP addresses are added. This information is crucial for routing and delivering the data packets to their intended destinations in the network. The IP address identifies the source and destination devices in the network and allows routers to forward the packets accordingly. By including the IP addresses, Layer 3 encapsulation ensures that the data is correctly routed and reaches the desired destination.

    Rate this question:

  • 8. 

    In a connectionless system, which of the following is correct?

    • A.

      The destination is contacted before a packet is sent

    • B.

      The destination is not contacted before a packet is sent

    • C.

      The destination sends an acknowledgement to the source that indicates the packet was received

    • D.

      The destination sends an acknowledgement to the source that requests the next packet to be sent

    Correct Answer
    B. The destination is not contacted before a packet is sent
    Explanation
    In a connectionless system, the destination is not contacted before a packet is sent. In connectionless communication, each packet is treated as an independent unit and does not require establishing a connection or prior communication with the destination. The sender simply sends the packet without any handshaking or acknowledgment from the destination. This approach allows for faster and more efficient transmission of data, but it also means that there is no guarantee of delivery or order of packets.

    Rate this question:

  • 9. 

    Which IP packet field will prevent endless loops?

    • A.

      Type-of-service

    • B.

      Identification

    • C.

      Flags

    • D.

      Time-to-live

    • E.

      Header checksum

    Correct Answer
    D. Time-to-live
    Explanation
    The time-to-live field in an IP packet is used to limit the lifespan of the packet. It specifies the maximum number of hops (routers) that the packet can pass through before it is discarded. This prevents endless loops by ensuring that if a packet gets stuck in a routing loop, it will eventually reach the maximum number of hops and be dropped. Therefore, the time-to-live field helps to prevent packets from circulating indefinitely in the network.

    Rate this question:

  • 10. 

    Which portion of the network layer address does a router use to forward packets?

    • A.

      Host portion

    • B.

      Broadcast address

    • C.

      Network portion

    • D.

      Gateway address

    Correct Answer
    C. Network portion
    Explanation
    A router uses the network portion of the network layer address to forward packets. The network portion identifies the specific network to which the packet needs to be sent. By examining this portion of the address, the router can determine the appropriate next hop or interface to forward the packet towards its destination. The host portion, broadcast address, and gateway address are not used for packet forwarding by the router.

    Rate this question:

  • 11. 

    If the default gateway is configured incorrectly on the host, what is the impact on communications?

    • A.

      The host is unable to communicate on the local network

    • B.

      The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks

    • C.

      The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network

    • D.

      There is no impact on communications

    Correct Answer
    B. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks
    Explanation
    If the default gateway is configured incorrectly on the host, it means that the host does not have the correct information about how to reach hosts on remote networks. As a result, the host can still communicate with other hosts on the local network because it does not need to use the default gateway for local communication. However, when it tries to communicate with hosts on remote networks, it will not be able to find the correct path to reach them and therefore will be unable to establish communication.

    Rate this question:

  • 12. 

    What is the purpose of a default gateway?

    • A.

      Physically connects a computer to a network

    • B.

      Provides a permanent address to a computer

    • C.

      Identifies the network to which a computer is connected

    • D.

      identifies the logical address of a networked computer and uniquely identifies it to the rest of the network

    • E.

      identifies the device that allows local network computers to communicate with devices on other networks

    Correct Answer
    E. identifies the device that allows local network computers to communicate with devices on other networks
    Explanation
    A default gateway is the device that allows local network computers to communicate with devices on other networks. It acts as an intermediary between the local network and external networks, forwarding network traffic between them. Without a default gateway, computers on a local network would only be able to communicate with other devices on the same network. The default gateway enables communication with devices on different networks by routing the traffic appropriately.

    Rate this question:

  • 13. 

    What type of routing uses information that is manually entered into the routing table?

    • A.

      Dynamic

    • B.

      Interior

    • C.

      Static

    • D.

      Standard

    Correct Answer
    C. Static
    Explanation
    Static routing uses information that is manually entered into the routing table. Unlike dynamic routing, which automatically updates the routing table based on network changes, static routing requires the network administrator to manually configure the routes. This can be useful in small networks or in cases where the network topology is stable and changes infrequently. Static routing is less flexible than dynamic routing, but it can be more efficient and secure since it does not rely on periodic updates and is less vulnerable to routing loops or other dynamic routing issues.

    Rate this question:

  • 14. 

    When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two)

    • A.

      The router sends an ARP request to determine the required next hop address

    • B.

      The router discards the packet

    • C.

      The router forwards the packet toward the next hop indicated in the ARP table

    • D.

      The router forwards the packet to the interface indicated by the source address

    • E.

      The router forwards the packet out the interface indicated by the default route entry

    Correct Answer(s)
    B. The router discards the packet
    E. The router forwards the packet out the interface indicated by the default route entry
    Explanation
    When the destination network is not listed in the routing table of a Cisco router, two possible actions that the router might take are discarding the packet and forwarding the packet out the interface indicated by the default route entry. If the router does not have a specific route for the destination network, it can choose to discard the packet. Alternatively, if there is a default route entry in the routing table, the router can forward the packet out the interface indicated by that default route entry.

    Rate this question:

  • 15. 

    What are the key factors to consider when grouping hosts into a common network? (Choose three)

    • A.

      Gateways

    • B.

      Purpose

    • C.

      Physical addressing

    • D.

      Software version

    • E.

      Geographic location

    • F.

      Ownership

    Correct Answer(s)
    B. Purpose
    E. Geographic location
    F. Ownership
    Explanation
    When grouping hosts into a common network, the purpose is an important factor to consider as it helps determine the specific requirements and goals of the network. Geographic location is also crucial as it affects factors like latency, network congestion, and accessibility. Ownership is another key factor as it determines who has control and responsibility over the network. Gateways, physical addressing, and software version are not mentioned as key factors in the question.

    Rate this question:

  • 16. 

    What is a component of a routing table entry?

    • A.

      The MAC address of the interface of the router

    • B.

      The destination Layer 4 port number

    • C.

      The destination host address

    • D.

      The next-hop address

    Correct Answer
    D. The next-hop address
    Explanation
    A component of a routing table entry is the next-hop address. The next-hop address refers to the IP address of the next router or network device that the packet should be forwarded to in order to reach its destination. Routing tables are used by routers to determine the best path for forwarding network traffic. By specifying the next-hop address, the router knows where to send the packet next in order to reach the correct destination.

    Rate this question:

  • 17. 

    Which intermediary devices could be used to implement security between networks? (Choose two)

    • A.

      Router

    • B.

      Hub

    • C.

      Switch

    • D.

      Firewall

    • E.

      Access point

    • F.

      Bridge

    Correct Answer(s)
    A. Router
    D. Firewall
    Explanation
    Routers can be used to implement security between networks by controlling the flow of data packets and enforcing access control policies. They can filter and block certain types of traffic, preventing unauthorized access to the network. Firewalls, on the other hand, are specifically designed to protect networks from unauthorized access and potential threats. They monitor incoming and outgoing network traffic, blocking malicious or suspicious activity and preventing unauthorized access to the network. Together, routers and firewalls provide a robust security solution for network protection.

    Rate this question:

  • 18. 

    What are three common problems with a large network? (Choose three)

    • A.

      Too few broadcasts

    • B.

      Performance degradation

    • C.

      Security issues

    • D.

      Limited management responsibility

    • E.

      Host identification

    • F.

      Protocol compatibility

    Correct Answer(s)
    B. Performance degradation
    C. Security issues
    E. Host identification
    Explanation
    A large network can experience performance degradation due to increased traffic and congestion. Security issues can arise in a large network as it becomes more difficult to monitor and protect against potential threats. Host identification can also be a problem in a large network, as it may be challenging to keep track of and manage a large number of hosts.

    Rate this question:

  • 19. 

    Which three statements are true about routes and their use? (Choose three)

    • A.

      If no route to the destination network is found, the packet is returned to the previous router

    • B.

      If the destination network is directly connected, the router forwards the packet to the destination host

    • C.

      If multiple network entries exist for the destination network, the most general route is used to forward the packet

    • D.

      If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router

    • E.

      If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route

    • F.

      If a host does not have a route manually configured for the destination network, the host will drop the packet

    Correct Answer(s)
    B. If the destination network is directly connected, the router forwards the packet to the destination host
    D. If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router
    E. If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route
    Explanation
    The first statement is true because if no route to the destination network is found, the packet is returned to the previous router. The second statement is true because if the destination network is directly connected, the router forwards the packet to the destination host. The third statement is true because if multiple network entries exist for the destination network, the most general route is used to forward the packet.

    Rate this question:

  • 20. 

    What two characteristics are commonly associated with dynamic routing protocols? (Choose two)

    • A.

      Require no device configuration

    • B.

      Provide routers with up-to-date routing tables

    • C.

      Require less processing power than static routes require

    • D.

      Consume bandwidth to exchange route information

    • E.

      Prevent manual configuration and maintenance of the routing table

    Correct Answer(s)
    B. Provide routers with up-to-date routing tables
    D. Consume bandwidth to exchange route information
    Explanation
    Dynamic routing protocols provide routers with up-to-date routing tables, which means that they constantly exchange information about network changes and updates. This allows routers to adapt to changes in the network topology and choose the most efficient paths for forwarding traffic. However, this constant exchange of information consumes bandwidth as routers need to send and receive routing updates. Therefore, dynamic routing protocols require the consumption of bandwidth to exchange route information.

    Rate this question:

  • 21. 

    What statement describes the purpose of a default route?

    • A.

      A host uses a default route to transfer data to another host on the same network segment

    • B.

      A host uses a default route to forward data to the local switch as the next hop to all destinations

    • C.

      A host uses a default route to identify the Layer 2 address of an end device on the local network

    • D.

      A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists

    Correct Answer
    D. A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists
    Explanation
    A default route is used by a host to transfer data to a host outside the local network when there is no other specific route available for the destination. It acts as a fallback option, allowing the host to send packets to a default gateway, which will then forward the data to the appropriate destination network. This is particularly useful when the host needs to communicate with networks that are not directly connected to it.

    Rate this question:

  • 22. 

    Which protocol provides connectionless network layer services?

    • A.

      IP

    • B.

      TCP

    • C.

      UDB

    • D.

      OSI

    Correct Answer
    A. IP
    Explanation
    IP (Internet Protocol) provides connectionless network layer services. Connectionless means that each packet is treated independently and is routed separately, without establishing a dedicated connection between the sender and receiver. IP is responsible for addressing and routing packets across the network, ensuring that they reach their intended destination. It does not guarantee the delivery or order of packets, making it a connectionless protocol. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both transport layer protocols that rely on IP for network layer services. OSI (Open Systems Interconnection) refers to a conceptual framework for understanding network protocols and is not a specific protocol itself.

    Rate this question:

  • 23. 

    What two commands can be used to view a host's routing table? Please separate answers with a comma and a space.

    Correct Answer
    netstat -r, route print
    route print, netstat -r
    Explanation
    The correct answer is "netstat -r, route print". These two commands can be used to view a host's routing table.

    Rate this question:

  • 24. 

    Select three pieces of information about a route that a routing table contains.

    • A.

      Next-hop

    • B.

      Source address

    • C.

      Metric

    • D.

      Destination network address

    • E.

      Last hop

    • F.

      Default gateway

    Correct Answer(s)
    A. Next-hop
    C. Metric
    D. Destination network address
    Explanation
    A routing table contains information about routes in a network. The next-hop is the IP address of the next device to which the packet should be forwarded. The metric is a value that indicates the cost or distance to reach the destination network. The destination network address is the IP address range for which the route is applicable. These three pieces of information are crucial for a router to determine the best path for forwarding packets to their destination.

    Rate this question:

  • 25. 

    What kinds of problems are caused by excessive broadcast traffic on a network segment? (Choose three)

    • A.

      Consumes network bandwidth

    • B.

      Increases overhead on network

    • C.

      Requires complex address schemes

    • D.

      Interrupts other host functions

    • E.

      Divides networks based on ownership

    • F.

      Advanced hardware required

    Correct Answer(s)
    A. Consumes network bandwidth
    B. Increases overhead on network
    D. Interrupts other host functions
    Explanation
    Excessive broadcast traffic on a network segment can cause several problems. Firstly, it consumes network bandwidth, as all devices on the segment receive and process the broadcast messages, leading to reduced available bandwidth for other network traffic. Secondly, it increases overhead on the network, as the broadcast messages need to be processed by all devices, adding extra burden on the network resources. Lastly, excessive broadcast traffic can interrupt other host functions, as the devices spend time and resources processing the unnecessary broadcast messages instead of performing their intended tasks.

    Rate this question:

  • 26. 

    Which of the following are not functions of the network layer? (Choose two)

    • A.

      Routing

    • B.

      Addressing packets with an IP address

    • C.

      Delivery reliability

    • D.

      Application data analysis

    • E.

      Encapsulation

    • F.

      Decapsulation

    Correct Answer(s)
    C. Delivery reliability
    D. Application data analysis
    Explanation
    The network layer is responsible for routing and addressing packets with an IP address. It is not responsible for delivery reliability or application data analysis. Delivery reliability is typically handled by the transport layer, while application data analysis is typically performed at the application layer. Encapsulation and decapsulation are processes that occur at various layers of the networking model and are not exclusive to the network layer.

    Rate this question:

  • 27. 

    Which of the following are true about IP? (Choose two)

    • A.

      IP stands for International Protocol

    • B.

      It is the most common network layer protocol

    • C.

      It analyses presentation layer data

    • D.

      It operates at OSI layer 2

    • E.

      It encapsulates transport layer segments

    Correct Answer(s)
    B. It is the most common network layer protocol
    E. It encapsulates transport layer segments
    Explanation
    The first statement, "It is the most common network layer protocol," is true because IP (Internet Protocol) is indeed the most commonly used network layer protocol in computer networks. It is responsible for routing packets of data between different networks.

    The second statement, "It encapsulates transport layer segments," is also true. IP takes the data from the transport layer (such as TCP or UDP segments) and encapsulates it into packets to be transmitted across the network.

    Rate this question:

  • 28. 

    What is the name of the process of removing the OSI layer 2 information from an IP packet?

    Correct Answer(s)
    Decapsulation
    Explanation
    Decapsulation is the process of removing the OSI layer 2 information from an IP packet. This process occurs when the packet is received at the destination. During decapsulation, the layer 2 header, such as the Ethernet header, is stripped off, leaving only the layer 3 IP packet. This allows the packet to be forwarded to the appropriate destination based on the IP address. Decapsulation is the opposite of encapsulation, which is the process of adding layer 2 information to an IP packet when it is transmitted.

    Rate this question:

  • 29. 

    Which of the following is true about IP?

    • A.

      It is connection-oriented

    • B.

      It uses application data to determine the best path

    • C.

      It is used by both routers and hosts

    • D.

      It is reliable

    Correct Answer
    C. It is used by both routers and hosts
    Explanation
    IP (Internet Protocol) is a network protocol that is used by both routers and hosts. Routers use IP to forward packets between different networks, while hosts use IP to send and receive data over the internet. IP is responsible for addressing and routing packets across the network, ensuring that they reach their intended destination. It is a fundamental protocol in the TCP/IP protocol suite, which is the foundation of the internet. However, IP is not connection-oriented, meaning it does not establish a dedicated connection between sender and receiver. Additionally, IP does not use application data to determine the best path for packets, and it is not considered reliable as it does not guarantee delivery of packets.

    Rate this question:

  • 30. 

    Which of the following are true about network layer encapsulation? (Choose two)

    • A.

      It adds a header to a segment

    • B.

      It can happen many times on the path to the destination host

    • C.

      It is performed by the last router on the path

    • D.

      Both source and destination IP addresses are added

    • E.

      It converts transport layer information into a frame

    Correct Answer(s)
    A. It adds a header to a segment
    D. Both source and destination IP addresses are added
    Explanation
    Network layer encapsulation involves adding a header to a segment, which is one of the true statements. Additionally, both the source and destination IP addresses are added during network layer encapsulation. This allows the network layer to identify the source and destination of the data being transmitted.

    Rate this question:

  • 31. 

    Which of the following are true about TCP and IP? (Choose two)

    • A.

      TCP is connectionless and IP is connection oriented

    • B.

      TCP is reliable and IP is unreliable

    • C.

      IP is connectionless and TCP is connection oriented

    • D.

      TCP is unreliable and IP is reliable

    • E.

      IP operates at the transport layer

    Correct Answer(s)
    B. TCP is reliable and IP is unreliable
    C. IP is connectionless and TCP is connection oriented
    Explanation
    TCP is reliable and IP is unreliable: TCP (Transmission Control Protocol) provides reliable, ordered, and error-checked delivery of data packets over a network. It ensures that data is delivered without loss or duplication. On the other hand, IP (Internet Protocol) is unreliable as it does not guarantee the delivery of packets. It is responsible for routing and addressing packets between different networks.

    IP is connectionless and TCP is connection-oriented: IP is connectionless, meaning it does not establish a dedicated connection between the sender and receiver. Each packet is treated independently and can take different routes to reach its destination. TCP, on the other hand, is connection-oriented, meaning it establishes a reliable connection between the sender and receiver before data transmission. It ensures the ordered delivery of packets and provides flow control and congestion control mechanisms.

    Rate this question:

  • 32. 

    Why is IP "media independent"?

    • A.

      It encapsulates layer 1 instructions

    • B.

      It works the same on all layer 1 media

    • C.

      It carries both video and voice data

    • D.

      It works without layer 1 media

    Correct Answer
    B. It works the same on all layer 1 media
    Explanation
    The correct answer is "It works the same on all layer 1 media." This means that IP is not dependent on any specific type of layer 1 media, such as copper wires or fiber optic cables. It is designed to work consistently and efficiently across different types of media, allowing for seamless communication and data transfer regardless of the underlying physical infrastructure.

    Rate this question:

  • 33. 

    TCP is a __________ layer protocol.

    Correct Answer
    transport
    Explanation
    TCP (Transmission Control Protocol) is a transport layer protocol. The transport layer is responsible for the end-to-end delivery of data between hosts on a network. TCP provides reliable, connection-oriented communication by establishing a connection, ensuring data integrity, and handling flow control and congestion control. It breaks down large data into smaller packets, sends them over the network, and reassembles them at the receiving end. Therefore, TCP being a transport layer protocol is the correct answer.

    Rate this question:

  • 34. 

    How many bits are in an IPv4 address?

    Correct Answer
    32
    Explanation
    An IPv4 address is made up of 32 bits. Each bit can have a value of either 0 or 1, resulting in a total of 2^32 possible combinations. These combinations are used to represent unique addresses for devices connected to the internet.

    Rate this question:

  • 35. 

    Which of the following are true about static and dynamic routing? (Choose two)

    • A.

      Static routing requires a routing protocol such as RIP

    • B.

      A default route is a dynamic route

    • C.

      Dynamic routing adds packet-processing overhead

    • D.

      Administrative overhead is reduced with static routing

    • E.

      Routers can use static and dynamic routing simultaneously

    Correct Answer(s)
    C. Dynamic routing adds packet-processing overhead
    E. Routers can use static and dynamic routing simultaneously
    Explanation
    Dynamic routing adds packet-processing overhead because routers using dynamic routing protocols need to constantly exchange routing information and update their routing tables. This requires additional processing power and network resources.

    Routers can use static and dynamic routing simultaneously because they can have both static routes, which are manually configured by network administrators, and dynamic routes, which are learned and updated automatically through routing protocols. This allows for greater flexibility and control in routing decisions.

    Rate this question:

  • 36. 

    What can happen when the TTL is 1? (Choose two)

    • A.

      The packet can be successfully delivered if it is destined for a directly connected network

    • B.

      TCP controls in the packet will add hops to the TTL

    • C.

      The packet will be dropped by the next router unless that router has an interface on the destination network

    • D.

      The packet will be returned to the source host

    • E.

      The packet will be returned to the previous router

    Correct Answer(s)
    A. The packet can be successfully delivered if it is destined for a directly connected network
    C. The packet will be dropped by the next router unless that router has an interface on the destination network
    Explanation
    When the TTL (Time to Live) is set to 1, two things can happen. Firstly, if the packet is destined for a directly connected network, it can be successfully delivered. This means that if the packet's destination is within the same network that it originated from, it will reach its intended destination. Secondly, if the packet is not destined for a directly connected network, the next router will drop the packet unless it has an interface on the destination network. In this case, the packet will not be able to reach its destination and will be discarded by the router.

    Rate this question:

  • 37. 

    IP is connectionless and will occasionally drop a packet en route to a destination IP address. If packets are dropped, how will messages be completed?

    • A.

      Only the IP portion of the packet is dropped, but the TCP portion continues to the last router

    • B.

      The routing protocols will carry the TCP information to the previous-hop router, which sends a reverse notification to the source

    • C.

      The routing protocols, such as RIP, are connection oriented and will contact the source host

    • D.

      The destination host is expecting the packet and will send a request if it does not arrive

    • E.

      The IP header contains the source address so that the packet can be returned by the router that receives the packet when TTL is 0

    Correct Answer
    D. The destination host is expecting the packet and will send a request if it does not arrive

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 27, 2011
    Quiz Created by
    JRoadkill
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.