Linux Networking Quiz 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 10,811
Questions: 32 | Attempts: 1,881

SettingsSettingsSettings
Linux Networking Quiz 1 - Quiz

Linux Networking class quiz 1.


Questions and Answers
  • 1. 

    In a token-passing network, bandwidth will be lost due to time-costly collision recovery.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    In a token-passing network, bandwidth will not be lost due to time-costly collision recovery. This is because in a token-passing network, only one device at a time is allowed to transmit data using a token. This eliminates the possibility of collisions and ensures efficient use of bandwidth.

    Rate this question:

  • 2. 

    In the OSI reference model, the ____ layer finds the best route for packets that must be transferred between different networks.

    • A.

      Data Link

    • B.

      Session

    • C.

      Transport

    • D.

      Network

    Correct Answer
    D. Network
    Explanation
    In the OSI reference model, the Network layer is responsible for finding the best route for packets that need to be transferred between different networks. This layer handles the addressing and routing of data packets, ensuring that they are properly delivered to their destination across multiple networks. The Network layer uses protocols such as IP (Internet Protocol) to accomplish this task.

    Rate this question:

  • 3. 

    In a ____ topology, computers are connected to the same cable.

    • A.

      Mesh

    • B.

      Star

    • C.

      Bus

    • D.

      Ring

    Correct Answer
    C. Bus
    Explanation
    In a bus topology, computers are connected to the same cable. This means that all computers on the network share the same communication medium, which is a single cable. Each computer is connected to the cable through a connector, allowing them to send and receive data. This type of topology is commonly used in Ethernet networks, where multiple computers are connected to a central cable, enabling them to communicate with each other.

    Rate this question:

  • 4. 

    ____ cable is a high-end medium that uses light pulses rather than electrical pulses to transmit data.

    • A.

      UTP

    • B.

      Fiber-optic

    • C.

      Coax

    • D.

      STP

    Correct Answer
    B. Fiber-optic
    Explanation
    Fiber-optic cable is a high-end medium that uses light pulses to transmit data. Unlike UTP (Unshielded Twisted Pair) and Coax (Coaxial) cables that use electrical pulses, fiber-optic cables use thin strands of glass or plastic to transmit data in the form of light. This allows for faster and more reliable data transmission over longer distances, making it suitable for high-speed internet connections and long-distance communication. STP (Shielded Twisted Pair) cables, on the other hand, are similar to UTP cables in terms of using electrical pulses for data transmission.

    Rate this question:

  • 5. 

    The ____ field in the ICMP packet header verifies the integrity of the ICMP packet.

    • A.

      Type

    • B.

      Checksum

    • C.

      Code

    • D.

      Sequence number

    Correct Answer
    B. Checksum
    Explanation
    The checksum field in the ICMP packet header verifies the integrity of the ICMP packet. This field contains a computed value that is used to check if the packet has been corrupted during transmission. By comparing the computed checksum with the received checksum, the recipient can determine if the packet has been altered or damaged. This helps ensure the reliability and accuracy of ICMP communications.

    Rate this question:

  • 6. 

    Each computer on an Ethernet network requires a network ____ that connects the computer with the network.

    • A.

      Interface

    • B.

      Driver

    • C.

      Adapter

    • D.

      Operating system

    Correct Answer
    A. Interface
    Explanation
    Each computer on an Ethernet network requires a network interface that connects the computer with the network. An interface is a hardware component or a software program that allows the computer to communicate with the network. It provides the necessary connections and protocols for data transmission and reception. Without a network interface, the computer would not be able to connect to the Ethernet network and communicate with other devices on the network.

    Rate this question:

  • 7. 

    In the CIDR generated IP address 192.168.12.254/24, ____ bits of the address are the host ID.

    • A.

      1

    • B.

      8

    • C.

      24

    • D.

      254

    Correct Answer
    B. 8
    Explanation
    In the CIDR generated IP address 192.168.12.254/24, the last 8 bits of the address are the host ID. The /24 indicates that the first 24 bits are used for the network ID, leaving the remaining 8 bits for the host ID.

    Rate this question:

  • 8. 

    PCs can function as terminals if they run terminal emulation programs.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    PCs can function as terminals if they run terminal emulation programs. This means that a PC can mimic the functionality of a terminal by using software that emulates the behavior of a terminal device. This allows the PC to connect to and communicate with other systems or networks as if it were a terminal. Therefore, the statement "PCs can function as terminals if they run terminal emulation programs" is true.

    Rate this question:

  • 9. 

    IPv6 supports over 100 ____ addresses.

    • A.

      Billion

    • B.

      Trillion

    • C.

      Quadrillion

    • D.

      Undecillion

    Correct Answer
    D. Undecillion
    Explanation
    IPv6 supports over 100 undecillion addresses. Undecillion is a mathematical term that represents the number 10 raised to the power of 36. This huge number of addresses is necessary due to the increasing number of devices connected to the internet. IPv6 was developed to replace IPv4, which had a limited number of addresses available. With undecillion addresses, IPv6 ensures that there are enough unique addresses for every device, allowing for continued growth and expansion of the internet.

    Rate this question:

  • 10. 

    The default ____ is an IP address configured on a host computer that identifies the computer to which packets should be sent when their network is not otherwise known to the host.

    • A.

      Route

    • B.

      Path

    • C.

      Link

    • D.

      Connection

    Correct Answer
    A. Route
    Explanation
    The default route is an IP address configured on a host computer that identifies the computer to which packets should be sent when their network is not otherwise known to the host. When a host receives a packet with a destination IP address that does not match any known network, it will forward the packet to the default route, which is the next hop for sending the packet towards its destination. This allows the host to communicate with networks that are not directly connected to it.

    Rate this question:

  • 11. 

    Both an IP address and a MAC address are assigned to each network interface.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Both an IP address and a MAC address are unique identifiers assigned to each network interface. An IP address is a logical address assigned by the network administrator, which allows devices to communicate with each other over the internet. On the other hand, a MAC address is a physical address embedded in the network interface card, which is used for communication within a local network. Therefore, it is true that both an IP address and a MAC address are assigned to each network interface.

    Rate this question:

  • 12. 

    MAC addresses are 48-bit binary values expressed in ____ notation.

    • A.

      Binary

    • B.

      Octal

    • C.

      Decimal

    • D.

      Hexadecimal

    Correct Answer
    D. Hexadecimal
    Explanation
    MAC addresses are 48-bit binary values expressed in hexadecimal notation. Hexadecimal notation uses a base-16 numbering system, which allows for a more compact representation of the binary values. In hexadecimal, each digit represents four bits, making it easier to read and work with compared to binary or octal.

    Rate this question:

  • 13. 

    The length of a User Datagram Protocol (UDP) header is ____ bytes.

    • A.

      8

    • B.

      16

    • C.

      20

    • D.

      32

    Correct Answer
    A. 8
    Explanation
    The length of a User Datagram Protocol (UDP) header is 8 bytes. The UDP header consists of four fields, each of which is 2 bytes in length. These fields include the source port, destination port, length, and checksum. Therefore, the total length of the UDP header is 8 bytes.

    Rate this question:

  • 14. 

    The ____ field in an Ethernet frame contains the data payload.

    • A.

      Preamble

    • B.

      Type

    • C.

      Information

    • D.

      FCS

    Correct Answer
    C. Information
    Explanation
    The information field in an Ethernet frame contains the data payload. This field is used to carry the actual data being transmitted over the Ethernet network. The preamble field is used to synchronize the timing between the sender and receiver, the type field specifies the protocol being used, and the FCS (Frame Check Sequence) field is used for error detection. However, it is the information field that carries the actual data payload.

    Rate this question:

  • 15. 

    The address of the local loopback interface is ____ regardless of operating system.

    • A.

      127.0.0.1

    • B.

      127.0.0.2

    • C.

      127.255.255.1

    • D.

      127.255.255.254

    Correct Answer
    A. 127.0.0.1
    Explanation
    The local loopback interface is a virtual network interface that allows a computer to send and receive network traffic on the same machine. Regardless of the operating system, the address of the local loopback interface is always 127.0.0.1. This address is reserved for loopback testing and is commonly referred to as the loopback address or localhost. It is used to test network applications or troubleshoot network connectivity issues without actually sending data over a physical network.

    Rate this question:

  • 16. 

    A kilobyte of computer memory is 1000 bytes.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A kilobyte of computer memory is actually 1024 bytes, not 1000. This is because computers use a binary system for data storage, where each unit is a power of 2. Therefore, a kilobyte is equal to 2^10 bytes, which is 1024.

    Rate this question:

  • 17. 

    The Internet model uses ____ layers,and each layer has specific protocols associated with it.

    • A.

      Three

    • B.

      Four

    • C.

      Seven

    • D.

      Ten

    Correct Answer
    B. Four
    Explanation
    The Internet model uses four layers, namely the application layer, transport layer, internet layer, and network interface layer. Each layer has specific protocols associated with it. These layers help in organizing and managing the flow of data across the internet, ensuring reliable and efficient communication between devices.

    Rate this question:

  • 18. 

    A protocol ____ is software designed to receive data in a specific format from a higher-level protocol and transmit it to a lower-level protocol.

    • A.

      Stack

    • B.

      Queue

    • C.

      Tree

    • D.

      List

    Correct Answer
    A. Stack
    Explanation
    A protocol stack is a software designed to receive data in a specific format from a higher-level protocol and transmit it to a lower-level protocol. In a protocol stack, the data is organized in a stack-like structure, where each layer of the stack performs specific functions and passes the data to the next layer until it reaches the lower-level protocol for transmission. Therefore, a protocol stack fits the description of receiving data from a higher-level protocol and transmitting it to a lower-level protocol.

    Rate this question:

  • 19. 

    ______ determines the amount of information that can be transmitted and is usually expressed in megabits per second (Mb/s).

    • A.

      Segmentation

    • B.

      Bandwidth

    • C.

      Subnet mask

    • D.

      Last mile connection

    • E.

      Terminal network

    Correct Answer
    B. Bandwidth
    Explanation
    Bandwidth refers to the amount of data that can be transmitted through a network connection within a given time frame. It is typically measured in megabits per second (Mb/s) and determines the capacity of the network to handle data traffic. Higher bandwidth allows for faster and more efficient transmission of information, while lower bandwidth can result in slower and congested connections. Therefore, bandwidth is the correct answer as it directly relates to the amount of information that can be transmitted.

    Rate this question:

  • 20. 

    _____ defines seven layers of network functionality that standard protocols would implement.

    • A.

      Subnet mask

    • B.

      Three-way handshake

    • C.

      Open Systems Interconnection (OSI) reference model

    • D.

      Terminal network

    • E.

      Open Shortest Path First (OSPF) protocol

    Correct Answer
    C. Open Systems Interconnection (OSI) reference model
    Explanation
    The Open Systems Interconnection (OSI) reference model is a conceptual framework that defines seven layers of network functionality. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Each layer has a specific role and set of protocols that standardize communication between network devices. The OSI model provides a standardized way for different systems to communicate with each other, ensuring compatibility and interoperability.

    Rate this question:

  • 21. 

    _____ commonly used routing protocol within organizational networks.

    • A.

      Three-way handshake

    • B.

      Open Shortest Path First (OSPF) protocol

    • C.

      Terminal network

    • D.

      Subnet mask

    • E.

      Segmentation

    Correct Answer
    B. Open Shortest Path First (OSPF) protocol
    Explanation
    Open Shortest Path First (OSPF) protocol is the most commonly used routing protocol within organizational networks. This protocol is designed to determine the most efficient path for routing data packets through a network. It uses a link-state algorithm to calculate the shortest path and updates its routing table accordingly. OSPF is preferred in organizational networks because it supports large networks, provides scalability, and allows for load balancing and redundancy. It also supports different types of networks and can adapt to changes in the network topology.

    Rate this question:

  • 22. 

    _____ used by a computer to establish a TCP connection with another host.

    • A.

      6BONE

    • B.

      Three-way handshake

    • C.

      Segmentation

    • D.

      Last mile connection

    • E.

      Terminal network

    Correct Answer
    B. Three-way handshake
    Explanation
    The correct answer is "three-way handshake." In a TCP connection, the three-way handshake is used by a computer to establish a connection with another host. It involves a series of steps where the client sends a SYN packet to the server, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the connection establishment. This process ensures that both the client and server agree on the initial sequence numbers and establishes a reliable connection between them.

    Rate this question:

  • 23. 

    _____ process of dividing a network into smaller parts.

    • A.

      Bandwidth

    • B.

      Segmentation

    • C.

      Subnet mask

    • D.

      6BONE

    • E.

      Open Shortest Path First (OSPF) protocol

    Correct Answer
    B. Segmentation
    Explanation
    Segmentation is the process of dividing a network into smaller parts. This is done to improve network performance, security, and manageability. By dividing a network into segments, traffic can be isolated and controlled, reducing congestion and improving overall efficiency. Segmentation also allows for easier troubleshooting and maintenance, as issues can be localized to specific segments rather than affecting the entire network.

    Rate this question:

  • 24. 

    _____ series of numbers that looks like an IP address but contains 1s for the network ID portion of the address and 0s for the host ID portion of the address.

    • A.

      Subnet mask

    • B.

      Bandwidth

    • C.

      6BONE

    • D.

      Three-way handshake

    • E.

      Open Systems Interconnection (OSI) reference model

    Correct Answer
    A. Subnet mask
    Explanation
    A subnet mask is a series of numbers that looks like an IP address but contains 1s for the network ID portion of the address and 0s for the host ID portion of the address. It is used to divide an IP address into two parts, the network ID and the host ID, by determining which bits in the IP address belong to the network and which belong to the host. The subnet mask is used in networking to determine which devices are on the same network and can communicate directly with each other.

    Rate this question:

  • 25. 

    _____ portion of Internet supporting IPv6.

    • A.

      Three-way handshake

    • B.

      Open Systems Interconnection (OSI) reference model

    • C.

      Bandwidth

    • D.

      6BONE

    • E.

      Subnet mask

    Correct Answer
    D. 6BONE
    Explanation
    The 6BONE portion of the Internet is a testing and experimental network that was used to support the transition from IPv4 to IPv6. It provided a platform for researchers and developers to test IPv6 protocols and applications before its widespread adoption. The 6BONE network was decommissioned in 2006 after IPv6 became more widely supported and implemented across the Internet.

    Rate this question:

  • 26. 

    _____ consists of a central computer or host with numerous terminals connected.

    • A.

      Subnet mask

    • B.

      6BONE

    • C.

      Bandwidth

    • D.

      Terminal network

    • E.

      Open Systems Interconnection (OSI) reference model

    Correct Answer
    D. Terminal network
    Explanation
    A terminal network consists of a central computer or host with numerous terminals connected. This means that there is a main computer or server that acts as the central hub, and multiple terminals or devices are connected to it. These terminals could be desktop computers, laptops, or any other device that can access the central computer. The central computer manages and controls the communication and data transfer between the terminals.

    Rate this question:

  • 27. 

    _____ refers to the connection that begins at the home or office, goes through the local neighborhood,and ends at an Internet service provider (ISP) or other fast service provider.

    • A.

      Open Systems Interconnection (OSI) reference model

    • B.

      Last mile connection

    • C.

      Bandwidth

    • D.

      Terminal network

    • E.

      6BONE

    Correct Answer
    B. Last mile connection
    Explanation
    A last mile connection refers to the connection that begins at the home or office, goes through the local neighborhood, and ends at an Internet service provider (ISP) or other fast service provider. This connection is the final link in the network infrastructure that connects end-users to the internet. It is called the "last mile" because it is the last leg of the network that delivers the internet service to the user's location.

    Rate this question:

  • 28. 

    A(n) ____ is a computer on a network that is equal to the other computers and has the ability to initiate communications, respond to requests for information, and interact with users independent of other computer systems.

    • A.

      Terminal

    • B.

      Client

    • C.

      Peer

    • D.

      Server

    Correct Answer
    C. Peer
    Explanation
    A peer is a computer on a network that is equal to the other computers and has the ability to initiate communications, respond to requests for information, and interact with users independent of other computer systems. Unlike a server, which provides services to other computers, a peer operates on an equal level with other computers in the network, allowing for decentralized communication and interaction.

    Rate this question:

  • 29. 

    ____ wireless uses transceivers and antennas mounted on buildings to transmit up to 18 miles, and they are cheaper to install than fiber-optic systems.

    • A.

      Fixed

    • B.

      Mobile

    • C.

      Virtual

    • D.

      Roaming

    Correct Answer
    A. Fixed
    Explanation
    Fixed wireless uses transceivers and antennas mounted on buildings to transmit up to 18 miles. This technology is cheaper to install compared to fiber-optic systems.

    Rate this question:

  • 30. 

    A 10-Mb/s Ethernet runs at ____ b/s.

    • A.

      1,000,000

    • B.

      1,024,000

    • C.

      10,000,000

    • D.

      10,240,000

    Correct Answer
    C. 10,000,000
    Explanation
    The correct answer is 10,000,000. This is because 10-Mb/s Ethernet refers to a network that has a data transfer rate of 10 megabits per second. To convert this to bits per second, we multiply the value by 1,000,000, resulting in 10,000,000 b/s.

    Rate this question:

  • 31. 

    The ____ field of a TCP packet header identifies the position within the stream of data for the data in this packet.

    • A.

      Sequence number

    • B.

      Source port

    • C.

      Acknowledgement number (ACK)

    • D.

      Flags

    Correct Answer
    A. Sequence number
    Explanation
    The sequence number field of a TCP packet header identifies the position within the stream of data for the data in this packet. This field is used to keep track of the order in which the packets are sent and received, allowing the receiving end to reassemble the data in the correct order.

    Rate this question:

  • 32. 

    ____ reduce network congestion on busy networks.

    • A.

      Hubs

    • B.

      NICs

    • C.

      Connectors

    • D.

      Switches

    Correct Answer
    D. Switches
    Explanation
    Switches reduce network congestion on busy networks by using a technique called packet switching. Unlike hubs, which simply broadcast data to all connected devices, switches analyze the data packets and forward them only to the intended recipient. This reduces the amount of unnecessary traffic on the network, leading to less congestion and improved network performance. NICs (network interface cards) and connectors are hardware components that facilitate network connectivity, but they do not directly reduce network congestion.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.