Linux Networking Quiz 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 11,281
| Attempts: 2,080 | Questions: 32
Please wait...
Question 1 / 32
0 %
0/100
Score 0/100
1. ____ cable is a high-end medium that uses light pulses rather than electrical pulses to transmit data.

Explanation

Fiber-optic cable is a high-end medium that uses light pulses to transmit data. Unlike UTP (Unshielded Twisted Pair) and Coax (Coaxial) cables that use electrical pulses, fiber-optic cables use thin strands of glass or plastic to transmit data in the form of light. This allows for faster and more reliable data transmission over longer distances, making it suitable for high-speed internet connections and long-distance communication. STP (Shielded Twisted Pair) cables, on the other hand, are similar to UTP cables in terms of using electrical pulses for data transmission.

Submit
Please wait...
About This Quiz
Linux Networking Quiz 1 - Quiz

Explore key concepts of Linux networking through this quiz, covering network models, topologies, media types, and protocol specifics.

2. The address of the local loopback interface is ____ regardless of operating system.

Explanation

The local loopback interface is a virtual network interface that allows a computer to send and receive network traffic on the same machine. Regardless of the operating system, the address of the local loopback interface is always 127.0.0.1. This address is reserved for loopback testing and is commonly referred to as the loopback address or localhost. It is used to test network applications or troubleshoot network connectivity issues without actually sending data over a physical network.

Submit
3. PCs can function as terminals if they run terminal emulation programs.

Explanation

PCs can function as terminals if they run terminal emulation programs. This means that a PC can mimic the functionality of a terminal by using software that emulates the behavior of a terminal device. This allows the PC to connect to and communicate with other systems or networks as if it were a terminal. Therefore, the statement "PCs can function as terminals if they run terminal emulation programs" is true.

Submit
4. _____ consists of a central computer or host with numerous terminals connected.

Explanation

A terminal network consists of a central computer or host with numerous terminals connected. This means that there is a main computer or server that acts as the central hub, and multiple terminals or devices are connected to it. These terminals could be desktop computers, laptops, or any other device that can access the central computer. The central computer manages and controls the communication and data transfer between the terminals.

Submit
5. ______ determines the amount of information that can be transmitted and is usually expressed in megabits per second (Mb/s).

Explanation

Bandwidth refers to the amount of data that can be transmitted through a network connection within a given time frame. It is typically measured in megabits per second (Mb/s) and determines the capacity of the network to handle data traffic. Higher bandwidth allows for faster and more efficient transmission of information, while lower bandwidth can result in slower and congested connections. Therefore, bandwidth is the correct answer as it directly relates to the amount of information that can be transmitted.

Submit
6. _____ defines seven layers of network functionality that standard protocols would implement.

Explanation

The Open Systems Interconnection (OSI) reference model is a conceptual framework that defines seven layers of network functionality. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Each layer has a specific role and set of protocols that standardize communication between network devices. The OSI model provides a standardized way for different systems to communicate with each other, ensuring compatibility and interoperability.

Submit
7. _____ series of numbers that looks like an IP address but contains 1s for the network ID portion of the address and 0s for the host ID portion of the address.

Explanation

A subnet mask is a series of numbers that looks like an IP address but contains 1s for the network ID portion of the address and 0s for the host ID portion of the address. It is used to divide an IP address into two parts, the network ID and the host ID, by determining which bits in the IP address belong to the network and which belong to the host. The subnet mask is used in networking to determine which devices are on the same network and can communicate directly with each other.

Submit
8. _____ refers to the connection that begins at the home or office, goes through the local neighborhood,and ends at an Internet service provider (ISP) or other fast service provider.

Explanation

A last mile connection refers to the connection that begins at the home or office, goes through the local neighborhood, and ends at an Internet service provider (ISP) or other fast service provider. This connection is the final link in the network infrastructure that connects end-users to the internet. It is called the "last mile" because it is the last leg of the network that delivers the internet service to the user's location.

Submit
9. The ____ field in the ICMP packet header verifies the integrity of the ICMP packet.

Explanation

The checksum field in the ICMP packet header verifies the integrity of the ICMP packet. This field contains a computed value that is used to check if the packet has been corrupted during transmission. By comparing the computed checksum with the received checksum, the recipient can determine if the packet has been altered or damaged. This helps ensure the reliability and accuracy of ICMP communications.

Submit
10. Both an IP address and a MAC address are assigned to each network interface.

Explanation

Both an IP address and a MAC address are unique identifiers assigned to each network interface. An IP address is a logical address assigned by the network administrator, which allows devices to communicate with each other over the internet. On the other hand, a MAC address is a physical address embedded in the network interface card, which is used for communication within a local network. Therefore, it is true that both an IP address and a MAC address are assigned to each network interface.

Submit
11. The default ____ is an IP address configured on a host computer that identifies the computer to which packets should be sent when their network is not otherwise known to the host.

Explanation

The default route is an IP address configured on a host computer that identifies the computer to which packets should be sent when their network is not otherwise known to the host. When a host receives a packet with a destination IP address that does not match any known network, it will forward the packet to the default route, which is the next hop for sending the packet towards its destination. This allows the host to communicate with networks that are not directly connected to it.

Submit
12. MAC addresses are 48-bit binary values expressed in ____ notation.

Explanation

MAC addresses are 48-bit binary values expressed in hexadecimal notation. Hexadecimal notation uses a base-16 numbering system, which allows for a more compact representation of the binary values. In hexadecimal, each digit represents four bits, making it easier to read and work with compared to binary or octal.

Submit
13. _____ used by a computer to establish a TCP connection with another host.

Explanation

The correct answer is "three-way handshake." In a TCP connection, the three-way handshake is used by a computer to establish a connection with another host. It involves a series of steps where the client sends a SYN packet to the server, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the connection establishment. This process ensures that both the client and server agree on the initial sequence numbers and establishes a reliable connection between them.

Submit
14. In a ____ topology, computers are connected to the same cable.

Explanation

In a bus topology, computers are connected to the same cable. This means that all computers on the network share the same communication medium, which is a single cable. Each computer is connected to the cable through a connector, allowing them to send and receive data. This type of topology is commonly used in Ethernet networks, where multiple computers are connected to a central cable, enabling them to communicate with each other.

Submit
15. Each computer on an Ethernet network requires a network ____ that connects the computer with the network.

Explanation

Each computer on an Ethernet network requires a network interface that connects the computer with the network. An interface is a hardware component or a software program that allows the computer to communicate with the network. It provides the necessary connections and protocols for data transmission and reception. Without a network interface, the computer would not be able to connect to the Ethernet network and communicate with other devices on the network.

Submit
16. _____ portion of Internet supporting IPv6.

Explanation

The 6BONE portion of the Internet is a testing and experimental network that was used to support the transition from IPv4 to IPv6. It provided a platform for researchers and developers to test IPv6 protocols and applications before its widespread adoption. The 6BONE network was decommissioned in 2006 after IPv6 became more widely supported and implemented across the Internet.

Submit
17. A protocol ____ is software designed to receive data in a specific format from a higher-level protocol and transmit it to a lower-level protocol.

Explanation

A protocol stack is a software designed to receive data in a specific format from a higher-level protocol and transmit it to a lower-level protocol. In a protocol stack, the data is organized in a stack-like structure, where each layer of the stack performs specific functions and passes the data to the next layer until it reaches the lower-level protocol for transmission. Therefore, a protocol stack fits the description of receiving data from a higher-level protocol and transmitting it to a lower-level protocol.

Submit
18. _____ commonly used routing protocol within organizational networks.

Explanation

Open Shortest Path First (OSPF) protocol is the most commonly used routing protocol within organizational networks. This protocol is designed to determine the most efficient path for routing data packets through a network. It uses a link-state algorithm to calculate the shortest path and updates its routing table accordingly. OSPF is preferred in organizational networks because it supports large networks, provides scalability, and allows for load balancing and redundancy. It also supports different types of networks and can adapt to changes in the network topology.

Submit
19. ____ reduce network congestion on busy networks.

Explanation

Switches reduce network congestion on busy networks by using a technique called packet switching. Unlike hubs, which simply broadcast data to all connected devices, switches analyze the data packets and forward them only to the intended recipient. This reduces the amount of unnecessary traffic on the network, leading to less congestion and improved network performance. NICs (network interface cards) and connectors are hardware components that facilitate network connectivity, but they do not directly reduce network congestion.

Submit
20. A kilobyte of computer memory is 1000 bytes.

Explanation

A kilobyte of computer memory is actually 1024 bytes, not 1000. This is because computers use a binary system for data storage, where each unit is a power of 2. Therefore, a kilobyte is equal to 2^10 bytes, which is 1024.

Submit
21. _____ process of dividing a network into smaller parts.

Explanation

Segmentation is the process of dividing a network into smaller parts. This is done to improve network performance, security, and manageability. By dividing a network into segments, traffic can be isolated and controlled, reducing congestion and improving overall efficiency. Segmentation also allows for easier troubleshooting and maintenance, as issues can be localized to specific segments rather than affecting the entire network.

Submit
22. The ____ field of a TCP packet header identifies the position within the stream of data for the data in this packet.

Explanation

The sequence number field of a TCP packet header identifies the position within the stream of data for the data in this packet. This field is used to keep track of the order in which the packets are sent and received, allowing the receiving end to reassemble the data in the correct order.

Submit
23. In the OSI reference model, the ____ layer finds the best route for packets that must be transferred between different networks.

Explanation

In the OSI reference model, the Network layer is responsible for finding the best route for packets that need to be transferred between different networks. This layer handles the addressing and routing of data packets, ensuring that they are properly delivered to their destination across multiple networks. The Network layer uses protocols such as IP (Internet Protocol) to accomplish this task.

Submit
24. In the CIDR generated IP address 192.168.12.254/24, ____ bits of the address are the host ID.

Explanation

In the CIDR generated IP address 192.168.12.254/24, the last 8 bits of the address are the host ID. The /24 indicates that the first 24 bits are used for the network ID, leaving the remaining 8 bits for the host ID.

Submit
25. The ____ field in an Ethernet frame contains the data payload.

Explanation

The information field in an Ethernet frame contains the data payload. This field is used to carry the actual data being transmitted over the Ethernet network. The preamble field is used to synchronize the timing between the sender and receiver, the type field specifies the protocol being used, and the FCS (Frame Check Sequence) field is used for error detection. However, it is the information field that carries the actual data payload.

Submit
26. The length of a User Datagram Protocol (UDP) header is ____ bytes.

Explanation

The length of a User Datagram Protocol (UDP) header is 8 bytes. The UDP header consists of four fields, each of which is 2 bytes in length. These fields include the source port, destination port, length, and checksum. Therefore, the total length of the UDP header is 8 bytes.

Submit
27. The Internet model uses ____ layers,and each layer has specific protocols associated with it.

Explanation

The Internet model uses four layers, namely the application layer, transport layer, internet layer, and network interface layer. Each layer has specific protocols associated with it. These layers help in organizing and managing the flow of data across the internet, ensuring reliable and efficient communication between devices.

Submit
28. In a token-passing network, bandwidth will be lost due to time-costly collision recovery.

Explanation

In a token-passing network, bandwidth will not be lost due to time-costly collision recovery. This is because in a token-passing network, only one device at a time is allowed to transmit data using a token. This eliminates the possibility of collisions and ensures efficient use of bandwidth.

Submit
29. A(n) ____ is a computer on a network that is equal to the other computers and has the ability to initiate communications, respond to requests for information, and interact with users independent of other computer systems.

Explanation

A peer is a computer on a network that is equal to the other computers and has the ability to initiate communications, respond to requests for information, and interact with users independent of other computer systems. Unlike a server, which provides services to other computers, a peer operates on an equal level with other computers in the network, allowing for decentralized communication and interaction.

Submit
30. ____ wireless uses transceivers and antennas mounted on buildings to transmit up to 18 miles, and they are cheaper to install than fiber-optic systems.

Explanation

Fixed wireless uses transceivers and antennas mounted on buildings to transmit up to 18 miles. This technology is cheaper to install compared to fiber-optic systems.

Submit
31. IPv6 supports over 100 ____ addresses.

Explanation

IPv6 supports over 100 undecillion addresses. Undecillion is a mathematical term that represents the number 10 raised to the power of 36. This huge number of addresses is necessary due to the increasing number of devices connected to the internet. IPv6 was developed to replace IPv4, which had a limited number of addresses available. With undecillion addresses, IPv6 ensures that there are enough unique addresses for every device, allowing for continued growth and expansion of the internet.

Submit
32. A 10-Mb/s Ethernet runs at ____ b/s.

Explanation

The correct answer is 10,000,000. This is because 10-Mb/s Ethernet refers to a network that has a data transfer rate of 10 megabits per second. To convert this to bits per second, we multiply the value by 1,000,000, resulting in 10,000,000 b/s.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 08, 2009
    Quiz Created by
    Svolore
Cancel
  • All
    All (32)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
____ cable is a high-end medium that uses light pulses rather than...
The address of the local loopback interface is ____ regardless of...
PCs can function as terminals if they run terminal emulation programs.
_____ consists of a central computer or host with numerous terminals...
______ determines the amount of information that can be transmitted...
_____ defines seven layers of network functionality that standard...
_____ series ...
_____ refers ...
The ____ field in the ICMP packet header verifies the integrity of the...
Both an IP address and a MAC address are assigned to each network...
The default ____ is an IP address configured on a host computer ...
MAC addresses are 48-bit binary values expressed in ____ notation.
_____ used by a computer to establish a TCP connection with another...
In a ____ topology, computers are connected to the same cable.
Each computer on an Ethernet network requires a network ____ that...
_____ portion of Internet supporting IPv6.
A protocol ____ is software designed to receive data in a specific ...
_____ commonly used routing protocol within organizational networks.
____ reduce network congestion on busy networks.
A kilobyte of computer memory is 1000 bytes.
_____ process of dividing a network into smaller parts.
The ____ field of a TCP packet header identifies the position within...
In the OSI reference model, the ____ layer finds the best route for...
In the CIDR generated IP address 192.168.12.254/24, ____ bits of the...
The ____ field in an Ethernet frame contains the data payload.
The length of a User Datagram Protocol (UDP) header is ____ bytes.
The Internet model uses ____ layers,and each layer has specific...
In a token-passing network, bandwidth will be lost due to time-costly...
A(n) ____ is a computer on a network that is equal to the other ...
____ wireless uses transceivers and antennas mounted on buildings to ...
IPv6 supports over 100 ____ addresses.
A 10-Mb/s Ethernet runs at ____ b/s.
Alert!

Advertisement