Introduction To TCP/IP: Trivia Exam! Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By BravoOrig
B
BravoOrig
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,173
| Attempts: 1,190
SettingsSettings
Please wait...
Please wait...
About This Quiz

This is an introduction to the TCP/IP quiz. The Transmission Control Protocol defines how to establish and maintain a network conversation for data exchange. How do you ensure that the internet conceptual model is applied correctly and any issues that arise are handled correctly? This is a good way to test out your skills. Give it a try and see See morehow much revision you may need on the topic. All the best!

Introduction To TCP/IP: Trivia Exam! Quiz - Quiz

Quiz Preview

  • 2. 

    ___________ supplies network devices reusable IP addresses, and configuration information.

    • OSI

    • HLEN

    • Code 12

    • DHCP

    • Code 15

    Correct Answer
    A. DHCP
    Explanation
    DHCP (Dynamic Host Configuration Protocol) is the correct answer because it is a network protocol that supplies network devices with reusable IP addresses and configuration information. DHCP allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network settings from a DHCP server. This eliminates the need for manual IP address configuration and makes it easier to manage and allocate IP addresses within a network.

    Rate this question:

  • 3. 

    Internet Protocol (IP) addresses are how many bits long?

    • 8

    • 16

    • 24

    • 32

    • 48

    Correct Answer
    A. 32
    Explanation
    IP addresses are how many bits long? The correct answer is 32. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It consists of four sets of numbers, each ranging from 0 to 255, separated by periods. Each set represents 8 bits, and since there are four sets, the total length of an IP address is 32 bits.

    Rate this question:

  • 4. 

    Which device evaluates and acts upon a packet's IP address?

    • Switch

    • Router

    • Hub

    • Repeater

    • Bridge

    Correct Answer
    A. Router
    Explanation
    A router is a device that evaluates and acts upon a packet's IP address. It is responsible for forwarding data packets between computer networks, determining the best path for the packets to reach their destination based on the IP address information. Routers are essential in directing traffic and ensuring that data is sent to the correct destination. Unlike switches or hubs, routers operate at the network layer of the OSI model and make decisions based on IP addresses rather than MAC addresses.

    Rate this question:

  • 5. 

    Which of the following does a router use to make forwarding decisions?

    • MAC addresses

    • Port numbers

    • Routing tables

    • MAC address tables

    • Broadcast addresses

    Correct Answer
    A. Routing tables
    Explanation
    A router uses routing tables to make forwarding decisions. Routing tables contain information about the network topology, including the available paths and the associated costs. Based on this information, the router determines the best path to forward packets to their destination. It compares the destination IP address of the packet with the entries in the routing table to find the appropriate next hop. By using routing tables, routers can efficiently and accurately direct network traffic towards its intended destination.

    Rate this question:

  • 6. 

    TCP keeps track of the segments of an e-mail message by placing _________ at the front of each piece.

    • A packet

    • A header

    • A datagram

    • An FTP

    • An OSI layer

    Correct Answer
    A. A header
    Explanation
    TCP keeps track of the segments of an e-mail message by placing a header at the front of each piece. The header contains important information such as the source and destination IP addresses, port numbers, sequence numbers, and other control information. This allows TCP to properly route and reassemble the segments at the receiving end, ensuring reliable delivery of the e-mail message.

    Rate this question:

  • 7. 

    Which is the best reason to use the FTP application?

    • When you need to configure a router or switch

    • When you need to access a Web site

    • When you need to pass large files over a slow connection

    • When you need to remotely access a mainframe computer

    • To collect network information

    Correct Answer
    A. When you need to pass large files over a slow connection
    Explanation
    The FTP (File Transfer Protocol) application is best used when you need to pass large files over a slow connection. FTP is specifically designed for efficient and reliable file transfer, making it ideal for situations where large files need to be transferred over a connection with limited bandwidth or high latency. Other applications may not be as efficient or reliable in these scenarios, making FTP the best choice.

    Rate this question:

  • 8. 

    Which TCP/IP troubleshooting tool is the fastest and easiest method to evaluate whether a host is available across a TCP/IP network?

    • Winipcfg.

    • Ipconfig.

    • Ping.

    • Telnet.

    • TTL.

    Correct Answer
    A. Ping.
    Explanation
    Ping is the fastest and easiest method to evaluate whether a host is available across a TCP/IP network. Ping sends a small packet of data to the target host and waits for a response. If a response is received, it indicates that the host is available and responsive. This tool is widely used for troubleshooting network connectivity issues and determining if a host is reachable.

    Rate this question:

  • 9. 

    The address 68.56.189.17 belongs to which IP class?

    • A

    • B

    • C

    • D

    • E

    Correct Answer
    A. A
    Explanation
    The address 68.56.189.17 belongs to IP class A because it falls within the range of 1.0.0.0 to 126.0.0.0, which is reserved for class A addresses. Class A addresses have a default subnet mask of 255.0.0.0 and are used for large networks with a large number of hosts.

    Rate this question:

  • 10. 

    Effective troubleshooting requires a ________ and ________ approach.

    • Strict/organized

    • Systematic/logical

    • Slow/methodical

    • Fast/innovative

    • Dynamic/sound

    Correct Answer
    A. Systematic/logical
    Explanation
    Effective troubleshooting requires a systematic and logical approach. This means that the process of identifying and resolving issues should be done in a step-by-step manner, following a set of predefined procedures and using logical reasoning. By being systematic, troubleshooting becomes more organized and efficient, ensuring that all possible causes are considered and evaluated in a logical and structured manner. This approach helps to eliminate guesswork and ensures that problems are addressed in a methodical and effective way.

    Rate this question:

  • 11. 

    Which of the following two ports are contained in the TCP header?

    • Host name server and domain name server.

    • Destination and source.

    • Active users and FTP.

    • FTP and Telnet.

    • Who is on system and active users.

    Correct Answer
    A. Destination and source.
    Explanation
    The correct answer is "Destination and source." In the TCP header, the destination port and source port are included. These ports are used to identify the specific processes or services running on the destination and source devices. The destination port indicates the specific service or process that should receive the data, while the source port identifies the sending process on the source device. This information is crucial for establishing a successful TCP connection and ensuring that the data is delivered to the correct destination.

    Rate this question:

  • 12. 

    How would an operator find a list of options available for the PING command?

    • Type "locate options" from a command line.

    • Use the Tracert command.

    • Use the Winipcfg command.

    • Type "ping" from a command line.

    • Type "options" from a command line.

    Correct Answer
    A. Type "ping" from a command line.
    Explanation
    To find a list of options available for the PING command, an operator can type "ping" from a command line. This command will display the available options and their descriptions, allowing the operator to choose the appropriate options for their needs.

    Rate this question:

  • 13. 

    Which is a valid Class B network address?

    • 15.129.89.76

    • 151.129.89.76

    • 193.129.89.76

    • 223.129.89.76

    Correct Answer
    A. 151.129.89.76
    Explanation
    The given IP address, 151.129.89.76, is a valid Class B network address because it falls within the range of 128.0.0.0 to 191.255.255.255. In Classful IP addressing, the first octet of a Class B address ranges from 128 to 191, indicating that the first two bits are always set to 1 and 0 respectively. Therefore, 151.129.89.76 satisfies the criteria for a Class B network address.

    Rate this question:

  • 14. 

    What is the decimal equivalent of binary 11001101?

    • 201

    • 203

    • 205

    • 207

    • 209

    Correct Answer
    A. 205
    Explanation
    The decimal equivalent of binary 11001101 is 205. In binary, each digit represents a power of 2, starting from the rightmost digit as 2^0. By adding up the values of each digit that is 1, we get 2^7 + 2^6 + 2^3 + 2^2 + 2^0, which equals 128 + 64 + 8 + 4 + 1, resulting in 205.

    Rate this question:

  • 15. 

    A router makes its packet forwarding decision based on what information?

    • The router's MAC address table.

    • The router's host table.

    • The router's routing table.

    • The router's NAT table.

    • The router's gateway table.

    Correct Answer
    A. The router's routing table.
    Explanation
    A router makes its packet forwarding decision based on the information stored in its routing table. The routing table contains information about the available routes and their associated metrics, such as the destination network and the next hop address. By comparing the destination IP address of the packet with the entries in the routing table, the router determines the best path to forward the packet. The MAC address table, host table, NAT table, and gateway table are used for other purposes such as MAC address resolution, IP address resolution, network address translation, and gateway configuration, respectively.

    Rate this question:

  • 16. 

    Which TCP/IP application allows a network user to remotely log on and manipulate a network device?

    • Browser

    • Telnet

    • FTP

    • HTTP

    • Rlogin

    Correct Answer
    A. Telnet
    Explanation
    Telnet is the correct answer because it is a TCP/IP application that allows a network user to remotely log on and manipulate a network device. Telnet provides a command-line interface to access and control devices such as routers, switches, and servers over a network. It enables users to execute commands, configure settings, and manage devices from a remote location. Telnet uses the Telnet protocol to establish a connection between the user's device and the remote device, providing a means for remote administration and troubleshooting.

    Rate this question:

  • 17. 

    Convert the binary address 01110011.11001000.00101100.00000010 to decimal.

    • 13.45.36.128

    • 115.200.44.2

    • 192.168.200.2

    • 100.10.120.3

    • 114.199.105.36

    Correct Answer
    A. 115.200.44.2
    Explanation
    The given binary address is divided into four octets: 01110011, 11001000, 00101100, and 00000010. Each octet is converted to decimal separately. The first octet, 01110011, is equal to 115 in decimal. The second octet, 11001000, is equal to 200 in decimal. The third octet, 00101100, is equal to 44 in decimal. And the fourth octet, 00000010, is equal to 2 in decimal. Therefore, the binary address 01110011.11001000.00101100.00000010 is equivalent to the decimal address 115.200.44.2.

    Rate this question:

  • 18. 

    Which type of IP broadcast address targets all hosts on a specified network segment?

    • 255.255.255.255

    • Netid.255.255.255

    • Limited broadcast

    • Subnet-directed broadcast

    • 255.255.255.0

    Correct Answer
    A. 255.255.255.255
    Explanation
    The correct answer is 255.255.255.255. This is the IP broadcast address that targets all hosts on a specified network segment. When a packet is sent to this address, it is delivered to all hosts on the network, allowing for communication with all devices on the network segment. This is known as a limited broadcast address, as it is limited to the local network segment and does not extend beyond it.

    Rate this question:

  • 19. 

    ******A device used to isolate an IP address's network portion from its host position is known as

    • A subnet mask

    • A host mask

    • An IP mask

    • A broadcast mask

    • A network mask

    Correct Answer
    A. A subnet mask
    Explanation
    A subnet mask is used to isolate an IP address's network portion from its host position. It helps to determine which part of the IP address represents the network and which part represents the host. By using a subnet mask, the network can be divided into smaller subnetworks, allowing for more efficient use of IP addresses and better network management.

    Rate this question:

  • 20. 

    Considering the default Cisco router default ADs, which of the following routes will a router consider more trustworthy than the others?

    • RIP

    • Static route

    • EIGRP

    • OSPF

    • EGP

    Correct Answer
    A. Static route
    Explanation
    A router will consider a static route more trustworthy than the other routes because it is manually configured by the network administrator. Static routes have a default Administrative Distance (AD) of 1, which is the lowest value among the default ADs of the given routing protocols. The lower the AD value, the more trustworthy the route is considered by the router. Therefore, a router will prioritize static routes over RIP, EIGRP, OSPF, and EGP routes when making routing decisions.

    Rate this question:

  • 21. 

    Which TCP/IP Internetwork Layer Protocol provides troubleshooting utilities such as ping and traceroute?

    • ICMP

    • IGMP

    • ARP

    • IARP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer because it is a TCP/IP Internetwork Layer Protocol that provides troubleshooting utilities such as ping and traceroute. ICMP is responsible for sending error messages and operational information about network conditions, making it useful for network diagnostics and troubleshooting. IGMP (Internet Group Management Protocol) is used for managing multicast group memberships, ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses, and IARP (Internet Address Resolution Protocol) is an obsolete protocol used for resolving network layer addresses.

    Rate this question:

  • 22. 

    Convert the IP address 172.68.10.2 from decimal to binary.

    • 10000000.01010101.10100000.00000010

    • 00011100.00010001.01000010.11001110

    • 00101110.10110000.11111100.11111111

    • 110111110.00111111.10111100.00011100

    • 10101100.01000100.00001010.00000010

    Correct Answer
    A. 10101100.01000100.00001010.00000010
    Explanation
    The given IP address 172.68.10.2 has been correctly converted from decimal to binary as 10101100.01000100.00001010.00000010.

    Rate this question:

  • 23. 

    To select the best path to a destination, all routing algorithms must use ______ stored in routing tables.

    • Core systems data

    • Growth diagrams

    • Interdomain Routing Protocol

    • Routing metrics

    • Internet Network Information Center Data

    Correct Answer
    A. Routing metrics
    Explanation
    Routing algorithms use routing metrics stored in routing tables to select the best path to a destination. Routing metrics are values or criteria used to determine the optimal route, such as the number of hops, bandwidth, delay, or cost associated with each possible path. By evaluating these metrics, routing algorithms can make informed decisions on which path to choose for forwarding data packets, ensuring efficient and reliable communication within a network.

    Rate this question:

  • 24. 

    A Class C network address provides for how many network and host bits?

    • 16 network, 16 hosts

    • 8 network, 24 hosts

    • 24 network, 8 hosts

    • 30 network, 2 hosts

    Correct Answer
    A. 24 network, 8 hosts
    Explanation
    A Class C network address provides for 24 network bits and 8 host bits. In a Class C network, the first three octets are used for network identification, leaving only 1 octet (8 bits) for host addresses. This allows for a maximum of 2^8 (256) possible host addresses. The remaining 24 bits are used to define the network, which allows for a maximum of 2^24 (16,777,216) possible networks.

    Rate this question:

  • 25. 

    Which one of the following protocols allows e-mail clients to download their messages from an e-mail server?

    • DNS

    • BOOTP

    • SMTP

    • POP3

    • DHCP

    Correct Answer
    A. POP3
    Explanation
    POP3 (Post Office Protocol version 3) is a protocol that allows e-mail clients to download their messages from an e-mail server. It is commonly used by e-mail clients to retrieve emails from a mail server over a TCP/IP connection. DNS (Domain Name System) is a protocol used for translating domain names into IP addresses. BOOTP (Bootstrap Protocol) is a protocol used for assigning IP addresses to network devices. SMTP (Simple Mail Transfer Protocol) is a protocol used for sending e-mails between servers. DHCP (Dynamic Host Configuration Protocol) is a protocol used for automatically assigning IP addresses to network devices.

    Rate this question:

  • 26. 

    Which TCP header control bit represents that the message is initiating a connection?

    • URG

    • INI

    • NEW

    • SYN

    • PSH

    Correct Answer
    A. SYN
    Explanation
    The correct answer is SYN. The SYN flag in the TCP header control bit is used to initiate a connection between two devices. When a device wants to establish a connection, it sends a TCP segment with the SYN flag set to the destination device. The destination device then responds with a SYN-ACK segment to acknowledge the request and initiate the connection establishment process.

    Rate this question:

  • 27. 

    Which network device allows communication between separate IP networks?

    • Hub

    • Bridge

    • Layer 2 switch

    • Router

    Correct Answer
    A. Router
    Explanation
    A router is a network device that allows communication between separate IP networks. It operates at the network layer (Layer 3) of the OSI model and is responsible for forwarding data packets between different networks. Routers use routing tables to determine the best path for data transmission, ensuring that packets reach their intended destinations. Unlike hubs, bridges, and layer 2 switches, which operate at lower layers of the OSI model, routers have the capability to connect networks with different IP addresses and enable communication between them.

    Rate this question:

  • 28. 

    Which of the following commands shows the path between source and destination in a TCP/IP network?

    • Ping

    • Winipcfg

    • Ipconfig

    • Fat ping

    • Tracert

    Correct Answer
    A. Tracert
    Explanation
    Tracert is the correct answer because it is a command used to trace the route taken by packets from the source to the destination in a TCP/IP network. It displays the path, including the IP addresses of the routers along the way, and the time taken for each hop. Ping, Winipcfg, Ipconfig, and Fat ping are not specifically designed to show the path between source and destination in a TCP/IP network.

    Rate this question:

  • 29. 

    Which TCP/IP model protocol provides reliable, sequenced, data delivery for the Application Layer?

    • DNS

    • Telnet

    • ICMP

    • UDP

    • TCP

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) is the correct answer because it provides reliable, sequenced data delivery for the Application Layer in the TCP/IP model. TCP ensures that data sent from one device is received accurately and in the correct order by the receiving device. It also includes mechanisms for error detection, flow control, and congestion control, making it a reliable choice for applications that require guaranteed delivery of data.

    Rate this question:

  • 30. 

    Which network device allows us to connect dissimilar network topologies?

    • Repeater

    • NIC

    • Computer

    • Hub

    • Bridge

    Correct Answer
    A. Bridge
    Explanation
    A bridge is a network device that allows us to connect dissimilar network topologies. It operates at the data link layer of the OSI model and can connect networks with different protocols, such as Ethernet and Token Ring. A bridge examines the destination MAC address of incoming data packets and forwards them only to the appropriate network segment, reducing unnecessary network traffic. By connecting dissimilar network topologies, a bridge enables communication between different types of networks, improving network efficiency and flexibility.

    Rate this question:

  • 31. 

    Which FTP command allows you to change directories within a file listing?

    • CD

    • CHDIR

    • CDIR

    • NEWDIR

    • CHGDIR

    Correct Answer
    A. CD
    Explanation
    The correct answer is CD. CD is the FTP command that allows you to change directories within a file listing. This command is used to navigate through different directories or folders in the FTP server. By using CD followed by the directory name, you can switch to that specific directory and view its contents.

    Rate this question:

  • 32. 

    Telnet is an example of which TCP/IP layer protocol?

    • Network Interface

    • Internetwork

    • Transport

    • Application

    Correct Answer
    A. Application
    Explanation
    Telnet is an example of an Application layer protocol in the TCP/IP model. The Application layer is responsible for providing network services to user applications. Telnet allows users to remotely access and control devices or systems over a network. It establishes a virtual terminal connection between the client and the server, enabling the user to interact with the remote system as if they were physically present.

    Rate this question:

  • 33. 

    What is the binary equivalent of 136 decimal?

    • 100001000

    • 11001100

    • 10010001

    • 10001001

    • 10001100

    Correct Answer
    A. 100001000
    Explanation
    The binary equivalent of 136 decimal is 100001000.

    Rate this question:

  • 34. 

    Which TCP/IP protocol passes IP addressing information to any client that requests it?

    • DNS

    • WINS

    • DHCP

    • SMB

    • FTP

    Correct Answer
    A. DHCP
    Explanation
    DHCP (Dynamic Host Configuration Protocol) is the correct answer because it is responsible for assigning IP addresses to client devices on a network. When a client device requests an IP address, DHCP passes the IP addressing information to that client. DNS (Domain Name System) is responsible for translating domain names into IP addresses, WINS (Windows Internet Naming Service) is an older system for name resolution in Windows networks, SMB (Server Message Block) is a protocol used for file sharing, and FTP (File Transfer Protocol) is a protocol used for transferring files over a network.

    Rate this question:

  • 35. 

    Which IP packet fragmentation header field specifies where the fragment belongs in the original datagram?

    • Identification.

    • Fragment Offset.

    • Total Length.

    • MTU.

    • Flags.

    Correct Answer
    A. Fragment Offset.
    Explanation
    The Fragment Offset field in the IP packet fragmentation header specifies where the fragment belongs in the original datagram. This field indicates the position of the data in the original packet, allowing the receiving device to properly reassemble the fragmented packets back into the original datagram.

    Rate this question:

  • 36. 

    UDP provides the ability to demultiplex data for an application based on

    • A network file system.

    • The OSI model.

    • A destination port number.

    • DNS services.

    • Reading a checksum.

    Correct Answer
    A. A destination port number.
    Explanation
    UDP (User Datagram Protocol) provides the ability to demultiplex data for an application based on a destination port number. In UDP, the source and destination ports are used to identify the specific application or process that should receive the data. By examining the destination port number, the UDP protocol can deliver the incoming data to the correct application on the receiving end. This allows multiple applications to use UDP simultaneously on the same device, as each application can be identified and distinguished by its unique destination port number.

    Rate this question:

  • 37. 

    Which TCP/IP protocol does a network use to find a physical address, given a logical address?

    • RARP

    • ARP

    • DNS

    • DHCP

    • HDLC

    Correct Answer
    A. ARP
    Explanation
    ARP (Address Resolution Protocol) is the TCP/IP protocol used by a network to find a physical address (MAC address) when given a logical address (IP address). It is responsible for mapping the IP address to the corresponding MAC address of a device on the network. This is essential for communication between devices on the same network, as the MAC address is required for data transmission at the physical layer of the TCP/IP protocol stack.

    Rate this question:

  • 38. 

    Which statement best describes NAT masquerading?

    • It hides all internal addresses behind one external address.

    • It hides all internal addresses behind one internal address.

    • It statically assigns all internal addresses to a single external address.

    • It hides all internal addresses behind a single port number.

    • It assigns all internal addresses to multiple ports.

    Correct Answer
    A. It hides all internal addresses behind one external address.
    Explanation
    NAT masquerading refers to a technique where multiple internal IP addresses are hidden behind a single external IP address. This allows multiple devices within a private network to access the internet using a single public IP address. The internal devices communicate with the external network through the NAT router, which modifies the source IP address of outgoing packets to match the external IP address. This way, all internal addresses are masked behind one external address, providing security and conserving IP addresses.

    Rate this question:

  • 39. 

    Which of the following is used to verify if an IP process is running on another host?

    • Telnet

    • Winipcfg

    • Nbtstat

    • Ping

    • ARP

    Correct Answer
    A. Ping
    Explanation
    Ping is used to verify if an IP process is running on another host. It sends a small packet of data to the specified IP address and waits for a response. If a response is received, it confirms that the IP process is running on the host. Ping is commonly used to check the connectivity and response time between two devices on a network.

    Rate this question:

  • 40. 

    Which is the valid Class C IP address range?

    • 192.000.001.hhh-223.255.254.hhh

    • 192.hhh.hhh.hhh-239.255.255.255

    • 224.000.000.000-239.255.255.255

    • 128.001.hhh.hhh-191.254.hhh.hhh

    Correct Answer
    A. 192.000.001.hhh-223.255.254.hhh
    Explanation
    The valid Class C IP address range is 192.000.001.hhh-223.255.254.hhh. This range includes all IP addresses starting from 192.0.1.0 to 223.255.254.255. Class C IP addresses have the first three octets reserved for network identification, while the last octet is used for host identification.

    Rate this question:

  • 41. 

    A Class D address is also known as which type of address?

    • Unicast

    • Broadcast

    • Private

    • Multicast

    Correct Answer
    A. Multicast
    Explanation
    A Class D address is known as a multicast address. Multicast addresses are used to send data packets to a group of devices simultaneously. Unlike unicast addresses that are used to send data to a single device, multicast addresses allow for efficient communication with multiple devices at once. This is particularly useful for applications such as video streaming or online gaming, where data needs to be sent to multiple recipients simultaneously.

    Rate this question:

  • 42. 

    As a result of issuing the FTP DIR command, each file listing entry begins with a "-"; what does the "-" indicate?

    • The entries are directories

    • The entries are files

    • The entries are executable files

    • The entries are invalid

    • The entries are encrypted

    Correct Answer
    A. The entries are files
    Explanation
    The "-" symbol indicates that the entries are files.

    Rate this question:

  • 43. 

    The maximum DNS domain name length is how many characters?

    • 64

    • 512

    • 200

    • 255

    • 128

    Correct Answer
    A. 255
    Explanation
    The maximum DNS domain name length is 255 characters. This limit is set by the DNS protocol and ensures that domain names can be properly resolved and managed by DNS servers. Exceeding this limit can cause issues with DNS resolution and may result in errors or failures when trying to access websites or other resources using the domain name.

    Rate this question:

  • 44. 

    What happens when a dynamic NAT device runs out of addresses to assign?

    • The NAT device drops the oldest connection.

    • The NAT device shares addresses between internal devices.

    • The NAT device multiplexes between internal devices.

    • The NAT devices use backup static map entries.

    • The NAT device refuses new connections.

    Correct Answer
    A. The NAT device refuses new connections.
    Explanation
    When a dynamic NAT device runs out of addresses to assign, it refuses new connections. This means that any new devices or connections attempting to use the NAT device will be denied access. This is because the NAT device has exhausted its pool of available addresses to assign to internal devices.

    Rate this question:

  • 45. 

    Which is the most important of the network troubleshooting steps?

    • Re-create the problem.

    • Isolate the problem.Isolate the problem.

    • Test the solution.

    • Identify the exact issue.

    • Identify a tool to use.

    Correct Answer
    A. Identify the exact issue.
    Explanation
    Identifying the exact issue is the most important step in network troubleshooting because without knowing the root cause of the problem, it is impossible to find an effective solution. Once the exact issue is identified, it becomes easier to determine the appropriate steps to resolve it. Re-creating the problem, isolating the problem, testing the solution, and identifying a tool to use are all important steps in the troubleshooting process, but they all rely on first identifying the exact issue.

    Rate this question:

  • 46. 

    Subnets are created by borrowing bits from the network address's __________ portion.

    • Network

    • Host

    • NAT

    • Network mask

    • IP Prefix

    Correct Answer
    A. Host
    Explanation
    Subnets are created by borrowing bits from the network address's host portion. This means that a portion of the host bits is used to create smaller subnetworks within the larger network. By borrowing these bits, the network can be divided into multiple subnets, each with its own unique network address and range of host addresses. This allows for more efficient use of IP addresses and better organization of network resources.

    Rate this question:

  • 47. 

    Routers that belong to the same AS are called

    • Reachability neighbors.

    • Interior neighbors.

    • Interconnected neighbors.

    • Exterior neighbors.

    • DVAs.

    Correct Answer
    A. Interior neighbors.
    Explanation
    Routers that belong to the same AS (Autonomous System) are called interior neighbors. AS is a collection of networks under a single administrative domain. Interior neighbors are routers within the same AS that exchange routing information using protocols like OSPF (Open Shortest Path First) or IS-IS (Intermediate System to Intermediate System). These routers work together to determine the best paths for forwarding traffic within the AS. Exterior neighbors, on the other hand, are routers in different ASs that exchange routing information at the border of the AS.

    Rate this question:

  • 48. 

    The OSI model Network Layer serves which primary purpose?

    • It uses layer 3 addresses to create multiple routerd networks.

    • It establishes, manages, and terminates sessions between applications.

    • It uses logical addresses to identify higher layer applications.

    • It builds frames that carry higher layer PDU across network segments.

    • It controls dialogs between two or more Presentation Layer entries.

    Correct Answer
    A. It uses layer 3 addresses to create multiple routerd networks.
    Explanation
    The OSI model Network Layer serves the primary purpose of using layer 3 addresses to create multiple routed networks. This means that it is responsible for addressing and routing data packets across different networks. Layer 3 addresses, also known as IP addresses, are used to identify devices and determine the best path for data transmission. By creating multiple routed networks, the Network Layer enables communication between different networks and ensures efficient and reliable data transfer.

    Rate this question:

  • 49. 

    ********If we borrow 3 bits from a Class C network address, how many useable subnets have we created?

    • 6

    • 3

    • 8

    • 10

    • 4

    Correct Answer
    A. 8
    Explanation
    By borrowing 3 bits from a Class C network address, we are increasing the number of available subnets. Each borrowed bit doubles the number of subnets. Since we borrowed 3 bits, we have 2^3 = 8 subnets. Therefore, we have created 8 usable subnets by borrowing 3 bits from a Class C network address.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 19, 2011
    Quiz Created by
    BravoOrig
Back to Top Back to top
Advertisement