Toughest Networking Trivia Questions Quiz! Practice Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rockayoub13
R
Rockayoub13
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,416
Questions: 126 | Attempts: 1,416

SettingsSettingsSettings
Toughest Networking Trivia Questions Quiz! Practice Test - Quiz

Below is the toughest networking trivia questions quiz that is perfectly designed for all those who think that they know all there is to networking. Do give it a shot and get to see how well you informed are and what you are yet to learn about networking. All the best, and keep an eye out for more quizzes just like it!


Questions and Answers
  • 1. 

    To directly open the Windows Network Connections Control Panel you can use Start -> Run and enter _______ [command] into the dialog box.

    Explanation
    To directly open the Windows Network Connections Control Panel, you can use the "ncpa.cpl" command in the Run dialog box. This command launches the "ncpa.cpl" file, which is the executable file for the Network Connections Control Panel. By entering this command, you can quickly access and manage your network connections without having to navigate through multiple menus or settings.

    Rate this question:

  • 2. 

    From a command prompt window, you can determine the current network settings for your PC. Which of the following commands will display the IP addresses assigned to each NIC on your Windows laptop?

    • A.

      Ipconfig

    • B.

      Ipconfig /showdns

    • C.

      Netstat -r

    Correct Answer
    A. Ipconfig
    Explanation
    The correct answer is "ipconfig". By running the "ipconfig" command in a command prompt window, you can view the current network settings for your PC, including the IP addresses assigned to each NIC (Network Interface Card) on your Windows laptop. This command provides detailed information about the IP configuration, subnet mask, default gateway, and other network settings for all active network interfaces on your computer.

    Rate this question:

  • 3. 

    You have just finished configuring the IP address on your workstation. Your gateway address is 172.16.255.254. What command would you enter to test that the gateway is reachable?

    Correct Answer
    ping 172.16.255.254
    Explanation
    To test the reachability of the gateway address 172.16.255.254, you would use the "ping" command followed by the IP address. The "ping" command sends a small packet of data to the specified IP address and waits for a response. If the gateway is reachable, it will respond to the ping request, indicating that the connection is successful.

    Rate this question:

  • 4. 

    What type of Ethernet cable is used to connect the Linksys router to the Laptop computer?

    • A.

      Rollover Cable

    • B.

      Straight-through

    • C.

      Cross-over

    • D.

      Co-axial

    Correct Answer
    B. Straight-through
    Explanation
    A straight-through Ethernet cable is used to connect a Linksys router to a laptop computer. This type of cable has the same pin configuration on both ends, allowing for a direct connection between devices of the same type, such as a router and a computer. A straight-through cable is commonly used for connecting a router to a computer, switch, or hub, enabling communication between these devices.

    Rate this question:

  • 5. 

    Referring to the IPv4 adapter configuration presented in the above image, what type of IPv4 the address will be assigned to the network adapter (static or dynamic)? Note: a static address is entered manually while the dynamic is obtained automatically via DHCP.

    Correct Answer
    dynamic
    Explanation
    Based on the information provided, the IPv4 address assigned to the network adapter will be dynamic. This is because dynamic addresses are obtained automatically through DHCP, which stands for Dynamic Host Configuration Protocol. In contrast, static addresses are manually entered. Since the question does not mention any manual input, it can be inferred that the address will be obtained automatically.

    Rate this question:

  • 6. 

    Running the command to find out what IP address has been assigned to your network adapter reveals an IP address of 169.254.10.22. Can you conclude that your network adaptor has successfully acquired an address from the DHCP server?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The IP address 169.254.10.22 is in the range of APIPA (Automatic Private IP Addressing) which is assigned when a device is unable to acquire an IP address from a DHCP server. This indicates that the network adapter has not successfully acquired an address from the DHCP server. Therefore, the conclusion that the network adapter has successfully acquired an address from the DHCP server is false.

    Rate this question:

  • 7. 

    What Application Layer protocol is being sent in frame #4?

    • A.

      IP

    • B.

      TCP

    • C.

      DNS

    • D.

      HTTP

    Correct Answer
    C. DNS
    Explanation
    In frame #4, the Application Layer protocol being sent is DNS (Domain Name System). DNS is responsible for translating domain names into IP addresses. It allows users to access websites by using easy-to-remember domain names instead of complicated IP addresses. In this case, frame #4 is specifically carrying DNS data, indicating that a DNS request or response is being transmitted at the Application Layer.

    Rate this question:

  • 8. 

    Which protocol implements a ping request and replies?

    • A.

      ICMP

    • B.

      IP

    • C.

      Echo Request / Echo Reply 

    • D.

      Client / Server

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer because it is the protocol that implements a ping request and replies. ICMP is used to send error messages and operational information about network conditions. Ping is a utility that uses ICMP to send a request to a remote host and waits for a reply, helping to determine if the remote host is reachable and measuring the round-trip time for the packets. Therefore, ICMP is the protocol responsible for handling ping requests and replies.

    Rate this question:

  • 9. 

    What PDU is encapsulated at the Network Layer?

    • A.

      A Segment is encapsulated at the Network Layer.

    • B.

      A Packet is encapsulated at the Network Layer.

    • C.

      Frame is encapsulated at the Network Layer

    • D.

      Data is encapsulated at the Network Layer.

    Correct Answer
    A. A Segment is encapsulated at the Network Layer.
    Explanation
    At the Network Layer, the correct PDU (Protocol Data Unit) that is encapsulated is a Segment. This layer is responsible for routing and forwarding data packets across different networks. Segments are created by the Transport Layer and are further encapsulated into packets at the Network Layer. The packets then undergo routing and are forwarded to the appropriate destination. Therefore, a Segment is the correct answer for the PDU encapsulated at the Network Layer.

    Rate this question:

  • 10. 

    Which network device(s) break the collision domain?

    • A.

      Router and Ethernet Switch

    • B.

      Ethernet Switch only

    • C.

      Ethernet Switch and Hub

    • D.

      None of the above

    Correct Answer
    A. Router and Ethernet Switch
    Explanation
    Routers and Ethernet switches are the network devices that break the collision domain. A collision domain is a network segment where network devices share the same bandwidth and can potentially collide with each other when transmitting data. Routers break the collision domain by separating different networks or subnets, allowing for efficient communication between them. Ethernet switches, on the other hand, break the collision domain by creating separate collision domains for each port, ensuring that data transmitted on one port does not collide with data transmitted on another port.

    Rate this question:

  • 11. 

    Why do network devices need two layers of addressing, Data Link Layer Address (i.e. Ethernet) and a Network Layer Address (i.e. IP Address)?

    • A.

      A Network Layer Address is used to forward the packet from one network segment to another network segment. The Data Link Address is used to forward the frame from one device to another within the network segment.

    • B.

      The IP Address can be used to forward packets to the final destination but historically Ethernet was developed first so it continues to be used for Data Link Addressing

    • C.

      A Data Link Layer Address is used to forward the packet from one network segment to another network segment. The Network Layer Address is used to forward the frame from one device to another within the network segment

    • D.

      Since MAC addresses are unique, a Data Link Layer Addresses can be used to forward frames to any destination. A Network Layer Address is logical a can only be used to send data to a destination on the same network segment

    Correct Answer
    A. A Network Layer Address is used to forward the packet from one network segment to another network segment. The Data Link Address is used to forward the frame from one device to another within the network segment.
    Explanation
    Network devices need two layers of addressing, Data Link Layer Address (i.e. Ethernet) and a Network Layer Address (i.e. IP Address), because they serve different purposes. The Network Layer Address is used to route packets from one network segment to another, allowing communication between different networks. On the other hand, the Data Link Layer Address is used to direct frames within the same network segment, enabling communication between devices within the same network. Both addresses are necessary for efficient and effective network communication, with the Network Layer Address handling inter-network communication and the Data Link Layer Address handling intra-network communication.

    Rate this question:

  • 12. 

    What is a LAN?

    • A.

      Local Area Networks are typically within a building and connect office workers to servers.

    • B.

      Local Area Networks typically connect users within a single room.

    • C.

      Local Area Networks are used to connect an organization's network segments which are located in different cities.

    • D.

      Local Area networks cover a geographic area roughly the size of a city.

    • E.

      None of these answers are correct.

    Correct Answer
    A. Local Area Networks are typically within a building and connect office workers to servers.
    Explanation
    LAN stands for Local Area Network, which is a network that connects devices within a limited area such as a building or campus. It is used to connect office workers to servers, allowing them to share resources and communicate with each other. This answer accurately describes the purpose and scope of a LAN, making it the correct choice.

    Rate this question:

  • 13. 

    What is Encapsulation?

    • A.

      It is the process of adding a protocol header and sometimes a trailer to a block of application data.

    • B.

      It is the process of removing the data portion of the PDU and passing it up to the next higher layer.

    • C.

      It is the process of obtaining a MAC addresses which corresponds to a given IP address.

    • D.

      It is the process of obtaining an IP addresses which corresponds to a given MAC address

    Correct Answer
    A. It is the process of adding a protocol header and sometimes a trailer to a block of application data.
  • 14. 

    What is Message Segmentation?

    • A.

      Segmentation is the process of breaking the application data stream into pieces or blocks of data

    • B.

      Segmentation is the process where devices communicate in both directions at the same time.

    • C.

      Segmentation is the process which allows data to be delivered to a destination on a different network.

    • D.

      Segmentation allows a server to determine which service the data should be directed to.

    Correct Answer
    A. Segmentation is the process of breaking the application data stream into pieces or blocks of data
  • 15. 

    This picture is an example of ________ Duplex communication.

    Correct Answer
    full
    Explanation
    This picture is an example of full duplex communication. In full duplex communication, data can be transmitted in both directions simultaneously. This means that both parties can send and receive information at the same time, allowing for a more efficient and seamless exchange of data.

    Rate this question:

  • 16. 

    How many bits and Hex digits does the MAC Address have?

    • A.

      48 bits (12 Hex digits)

    • B.

      48 bits (18 Hex digits)

    • C.

      MAC Addresses don't use Hex digits

    • D.

      24 bits (6 Hex digits)

    • E.

      32 bits (18 Hex digits)

    Correct Answer
    A. 48 bits (12 Hex digits)
    Explanation
    A MAC address is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It consists of 48 bits, which can be represented by 12 hexadecimal (Hex) digits. Each hexadecimal digit represents 4 bits, so 12 digits are needed to represent 48 bits. Therefore, the correct answer is 48 bits (12 Hex digits).

    Rate this question:

  • 17. 

    What is the basic operation of an Ethernet Switch?

    • A.

      After a frame arrives at a switch port, the Switch looks up the destination MAC address in the MAC Address Table to determine on which port to send the frame and then sends the frame.

    • B.

      After a frame arrives at a switch port, the Switch looks up the destination MAC address in the Routing Table to determine on which port to send the frame and then sends the frame

    • C.

      After a packet arrives at a switch port, the Switch looks up the source MAC address in the MAC Address Table to determine on which port to send the frame and then sends the frame

    • D.

      After a frame arrives at a switch port, the Switch looks up the destination MAC address in the arp table to determine on which port to send the frame and then sends the frame

    • E.

      All the above are variations of the correct basic operation

    Correct Answer
    A. After a frame arrives at a switch port, the Switch looks up the destination MAC address in the MAC Address Table to determine on which port to send the frame and then sends the frame.
    Explanation
    The correct answer is that after a frame arrives at a switch port, the switch looks up the destination MAC address in the MAC Address Table to determine on which port to send the frame and then sends the frame. This is the basic operation of an Ethernet switch. The switch uses the MAC Address Table to keep track of which devices are connected to which ports, allowing it to efficiently forward frames to the correct destination. The other options mentioned in the question are not the correct basic operation of an Ethernet switch.

    Rate this question:

  • 18. 

    What happens to an incoming frame if the Switch doesn't have an entry for the Destination Address in its MAC Address Table?

    • A.

      The frame is sent out all ports except the ingress port (original incoming port)

    • B.

      The frame is dropped until it learns the correct port from the source address of an incoming frame.

    • C.

      The frame is sent out all ports in an attempt to reach the destination device

    • D.

      The switch sends an ARP request and the device with the destination MAC address responds

    • E.

      Switches populate the MAC Address Table by observing the Source MAC Address of all incoming frames

    Correct Answer
    A. The frame is sent out all ports except the ingress port (original incoming port)
    Explanation
    When a switch doesn't have an entry for the destination address in its MAC Address Table, it doesn't know which port to forward the frame to. In this case, the switch will flood the frame out of all ports except the one it received the frame from. This is because the switch assumes that the destination device is connected to one of the other ports and by flooding the frame, it increases the chances of reaching the correct destination device.

    Rate this question:

  • 19. 

    How does the Switch learn on which port a device is connected?

    • A.

      When a device sends a frame via a Switch, the Switch reads the Source MAC Address of the frame and enters it into the MAC Address Table together with the physical port number on which the frame arrived

    • B.

      This is usually done by the network administrator by statically adding the information to the MAC Address Table

    • C.

      When a device sends a frame via a Switch, the Switch reads the Destination MAC Address of the frame and enters it into the MAC Address Table together with the physical port number on which the frame arrived.

    • D.

      When a device sends a frame via a Switch, the Switch reads the Source IP Address of the frame and enters it into the MAC Address Table together with the port number on which the frame arrived. 

    Correct Answer
    A. When a device sends a frame via a Switch, the Switch reads the Source MAC Address of the frame and enters it into the MAC Address Table together with the physical port number on which the frame arrived
    Explanation
    The correct answer is that when a device sends a frame via a Switch, the Switch reads the Source MAC Address of the frame and enters it into the MAC Address Table together with the physical port number on which the frame arrived. This allows the Switch to learn the association between the MAC Address and the port, enabling it to efficiently forward future frames to the correct destination.

    Rate this question:

  • 20. 

    Which of these are Intermediary Devices?

    • A.

      Switch

    • B.

      Router

    • C.

      PC

    • D.

      Tablet

    • E.

      VoiP Phone

    Correct Answer(s)
    A. Switch
    B. Router
    Explanation
    Switches and routers are both examples of intermediary devices in computer networks. A switch is a networking device that connects multiple devices within a local area network (LAN) and forwards data packets between them. It operates at the data link layer of the OSI model. On the other hand, a router is a networking device that connects multiple networks together and forwards data packets between them. It operates at the network layer of the OSI model. Both switches and routers play crucial roles in directing network traffic and ensuring efficient communication between devices in a network.

    Rate this question:

  • 21. 

    The network diagram shows the simplified MAC address next to their respective interfaces. PCO sends a message to PC I. To which MAC Address does PCO send the frame? 

    • A.

      00-01-0b

    • B.

      00-01-0c

    • C.

      00-01-0d

    • D.

      00-01-0e

    • E.

      00-01-0f

    Correct Answer
    A. 00-01-0b
    Explanation
    PCO sends the frame to the MAC address 00-01-0b.

    Rate this question:

  • 22. 

    What is the difference between the OSI Protocol Stack Model and the TCP/IP Stack Model? 

    • A.

      The OSI Model has 4 layers whereas the TCP/IP Model has 7 layers.

    • B.

      The TCP/IP Model was developed for the TCP and IP protocols whereas the OSI Model is generic

    • C.

      The OSI Model was developed by the IETF whereas the TCP/IP Model was developed by the ITU standards body

    • D.

      Layer 3 of the TCP/IP Model is the Transport layer whereas layer 2 of the OSI Model is the Transport layer

    Correct Answer
    B. The TCP/IP Model was developed for the TCP and IP protocols whereas the OSI Model is generic
    Explanation
    The explanation for the given correct answer is that the TCP/IP Model was specifically designed for the TCP and IP protocols, which are the fundamental protocols used in the internet. On the other hand, the OSI Model is a generic model that can be used to understand and describe any network protocol. This key difference in the purpose of the two models highlights their different focuses and applications.

    Rate this question:

  • 23. 

    Which command can be used to test connectivity between two computers that are a5ached to a network?

    • A.

      Ipconfig

    • B.

      Ping

    • C.

      Winipcfg

    • D.

      Ifconfig

    • E.

      Netstat -s

    Correct Answer
    B. Ping
    Explanation
    The correct answer is "ping". The ping command is used to test connectivity between two computers on a network by sending an ICMP echo request to the target computer and waiting for a response. If a response is received, it indicates that there is a network connection between the two computers. This command is commonly used to troubleshoot network connectivity issues and measure the round-trip time (RTT) between the sender and receiver.

    Rate this question:

  • 24. 

    What is the OUI of this MAC Address: 00-18-23-1a-45-0b?

    • A.

      00-18-23

    • B.

      00-18-23-00-00-00

    • C.

      1a-45-0b

    • D.

      00-00-00-1a-45-0b

    • E.

      Option 5FF-FF-FF-FF-FF-FF

    Correct Answer
    A. 00-18-23
    Explanation
    The OUI (Organizationally Unique Identifier) of a MAC Address refers to the first three octets of the address. In this case, the MAC address is 00-18-23-1a-45-0b. The OUI is 00-18-23, which represents the unique identifier assigned to the organization that manufactured the device associated with this MAC address.

    Rate this question:

  • 25. 

    PC0 needs to send a frame to PC1. PC0 broadcasts an ARP request to learn the MAC address of which device?

    • A.

      Switch0

    • B.

      PC1

    • C.

      Router0

    • D.

      Router1

    Correct Answer
    B. PC1
    Explanation
    PC0 needs to send a frame to PC1, so it broadcasts an ARP request to learn the MAC address of PC1. This is because ARP (Address Resolution Protocol) is used to map an IP address to a MAC address in a local network. By sending an ARP request, PC0 is asking for the MAC address of PC1 so that it can properly address and send the frame to the correct device.

    Rate this question:

  • 26. 

    Which layer encapsulates the Network Layer PDU? 

    • A.

      Data Link

    • B.

      Transport

    • C.

      Physical

    • D.

      Application

    • E.

      Network

    Correct Answer
    A. Data Link
    Explanation
    The Data Link layer encapsulates the Network Layer PDU. This layer is responsible for providing error-free transmission of data frames over the physical network. It takes the packets received from the Network Layer and adds a header and trailer to create a frame. The frame contains the necessary information for data link control, such as source and destination MAC addresses. The Data Link layer then transmits the frame to the physical network.

    Rate this question:

  • 27. 

    Which field in the IPv4 header Is used to prevent a packet from traversing a network endlessly? 

    • A.

      Time-to-Live 

    • B.

      Sequence Number

    • C.

      Acknowledgment Number

    • D.

      Differentiated Services 

    Correct Answer
    A. Time-to-Live 
    Explanation
    The Time-to-Live field in the IPv4 header is used to prevent a packet from traversing a network endlessly. It is a counter that specifies the maximum number of network hops (routers) that the packet can pass through before being discarded. Each time the packet passes through a router, the TTL value is decremented by one. If the TTL reaches zero, the packet is discarded and an error message is sent back to the source. This mechanism helps to prevent packets from indefinitely circulating in a network and consuming network resources.

    Rate this question:

  • 28. 

    Convert 255.255.255.192 to prefix/slash notation. 

    Correct Answer
    /26
    Explanation
    The given IP address 255.255.255.192 can be converted to prefix/slash notation by counting the number of network bits. In this case, the subnet mask 255.255.255.192 has 26 network bits, which means that the first 26 bits of the IP address are used to identify the network, while the remaining 6 bits are used for host addresses. Therefore, the correct answer is /26.

    Rate this question:

  • 29. 

    Convert the following binary number to decimal: 11100111 

    • A.

      125

    • B.

      231

    • C.

      236

    • D.

      118

    Correct Answer
    B. 231
    Explanation
    The given binary number, 11100111, can be converted to decimal by multiplying each digit by its corresponding power of 2 and adding them together. Starting from the rightmost digit, the powers of 2 are 2^0, 2^1, 2^2, 2^3, 2^4, 2^5, 2^6, and 2^7. Multiplying each digit by its corresponding power of 2 and adding them together, we get: 1*(2^0) + 1*(2^1) + 1*(2^2) + 0*(2^3) + 0*(2^4) + 1*(2^5) + 1*(2^6) + 1*(2^7) = 231. Therefore, the correct answer is 231.

    Rate this question:

  • 30. 

    What is the second last host address for the following network address: 10.23.100.64/26 

    • A.

      10.23.100.193 

    • B.

      10.23.100.125 

    • C.

      10.23.100.64 

    • D.

      10.23.100.65 

    Correct Answer
    C. 10.23.100.64 
    Explanation
    The given network address is 10.23.100.64/26, which means that the first 26 bits are the network address and the remaining 6 bits are for host addresses. The second last host address can be found by taking the last host address and subtracting 2. The last host address in this case is 10.23.100.65, so subtracting 2 gives us 10.23.100.63. However, this address is not within the given options. Therefore, the correct answer is 10.23.100.64.

    Rate this question:

  • 31. 

    Convert the following decimal number to Hex: 147 All answers shown are In Hex. 

    • A.

      A6

    • B.

      9c

    • C.

      93

    • D.

      D4

    Correct Answer
    C. 93
    Explanation
    The correct answer is 93 because when converting the decimal number 147 to hexadecimal, we divide it by 16 repeatedly until the quotient is 0. The remainders in each division are then converted to hexadecimal digits. In this case, 147 divided by 16 equals 9 with a remainder of 3. The remainder 3 corresponds to the hexadecimal digit 3. Therefore, the hexadecimal representation of 147 is 93.

    Rate this question:

  • 32. 

    How many usable host addresses are contained in this network address: 192.168.1.0/31? 

    • A.

      4

    • B.

      0

    • C.

      2

    • D.

      8

    Correct Answer
    B. 0
    Explanation
    The network address 192.168.1.0/31 has a subnet mask of 31. A subnet mask of 31 allows for only two usable host addresses. However, one of these addresses is reserved as the network address and the other as the broadcast address. Therefore, there are no usable host addresses available in this network address.

    Rate this question:

  • 33. 

    What are the reasons a network administrator might want to create subnets?

    • A.

      Simplifies network design 

    • B.

      Improves network performance 

    • C.

      Easier to implement security policies 

    • D.

      Reduction in the number of switches needed 

    • E.

      Reduction in the number of routers needed 

    Correct Answer(s)
    B. Improves network performance 
    C. Easier to implement security policies 
    Explanation
    Creating subnets can improve network performance by reducing network congestion and improving overall network efficiency. By dividing a large network into smaller subnets, network traffic can be distributed more effectively, reducing bottlenecks and improving response times. Additionally, creating subnets makes it easier to implement security policies. By isolating different parts of the network into separate subnets, administrators can apply specific security measures to each subnet, enhancing network security overall.

    Rate this question:

  • 34. 

    Consider the Switch and its MAC Address Table shown in the Figure. PC-A sends a frame to PC-B. How does the Switch know on which port to send the frame? 

    • A.

      The switch broadcasts an ARP request for the destination device. When the destination device responds with the ARP reply, the switch learns on which port the destination port is connected. 

    • B.

      The Switch does not know where to send the frame and drops it until it can learn the correct port. 

    • C.

      The MAC Address Table must be statically configured with the correct information. 

    • D.

      The MAC Address table is populated with the MAC Address-to-Port mapping information and the switch uses this information to select the outgoing port.

    • E.

      The Switch broadcasts the frame on all ports except the one connected to PCA. 

    Correct Answer
    E. The Switch broadcasts the frame on all ports except the one connected to PCA. 
    Explanation
    The switch broadcasts the frame on all ports except the one connected to PCA. This is because the switch does not have the MAC address of PC-B in its MAC Address Table, so it does not know which port to send the frame to. By broadcasting the frame on all ports except the one connected to PCA, the switch ensures that PC-B will receive the frame and be able to respond with an ARP reply. Once the switch receives the ARP reply, it will learn the MAC address of PC-B and update its MAC Address Table accordingly.

    Rate this question:

  • 35. 

    What is the network address for the following host address: 172.16.25.130 and mask: 255.255.255.128?

    • A.

      172.16.25.192 

    • B.

      172.16.25.0 

    • C.

      172.16.25.128 

    • D.

      172.16.25.130 

    Correct Answer
    C. 172.16.25.128 
    Explanation
    The network address is determined by performing a bitwise AND operation between the host address and the subnet mask. In this case, the network address is obtained by ANDing 172.16.25.130 with 255.255.255.128. The result is 172.16.25.128, which is the correct answer.

    Rate this question:

  • 36. 

    What happens to an incoming frame if the Switch doesn't have an entry for the Destination Address in its MAC Address Table? 

    • A.

      The frame is sent out all ports except the ingress port (original incoming port) 

    • B.

      Switches populate the MAC Address Table by observing the Source MAC Address of all incoming frames. 

    • C.

      The switch sends an ARP request and the device with the destination MAC address responds. 

    • D.

      The frame is sent out all ports in an attempt to reach the destination device. 

    • E.

      The frame is dropped until it learns the correct port from the source address of an incoming frame. 

    Correct Answer
    A. The frame is sent out all ports except the ingress port (original incoming port) 
    Explanation
    When a switch doesn't have an entry for the Destination Address in its MAC Address Table, it means that the switch doesn't know the port to which the frame should be forwarded. In this case, the switch will flood the frame out of all ports except the one it came from (the ingress port) in an attempt to reach the destination device. This is because flooding ensures that the frame reaches the correct destination, even if the switch doesn't have the necessary information in its MAC Address Table.

    Rate this question:

  • 37. 

    What is the purpose of the subnet mask in conjunction with an IP address? 

    • A.

      To identify whether the address is public or private 

    • B.

      To determine the subnet to which the host belongs 

    • C.

      To uniquely identify a host on a network 

    • D.

      To mask the IP address to outsiders 

    Correct Answer
    B. To determine the subnet to which the host belongs 
    Explanation
    The purpose of the subnet mask in conjunction with an IP address is to determine the subnet to which the host belongs. The subnet mask is used to divide an IP address into network and host portions. By comparing the subnet mask with the IP address, the network can determine which part of the address represents the network and which part represents the host. This allows for efficient routing of data within the network and ensures that the host can communicate with other devices within the same subnet.

    Rate this question:

  • 38. 

    Convert /17 to decimal notation

    Correct Answer
    255.255.128.0
    Explanation
    The given answer, 255.255.128.0, is the decimal notation for the IP address /17. In IP address notation, the /17 indicates that the first 17 bits of the address are network bits, while the remaining 15 bits are host bits. In decimal notation, each octet represents 8 bits, so the first two octets, 255.255, represent the network bits. The third octet, 128, represents the first 7 host bits, and the fourth octet, 0, represents the remaining 8th host bit. Therefore, the decimal notation for /17 is 255.255.128.0.

    Rate this question:

  • 39. 

    Given the network address 172.16.0.0 16, how many host bits need to be borrowed to create 8 subnets? 

    • A.

      2

    • B.

      3

    • C.

      4

    • D.

      5

    Correct Answer
    B. 3
    Explanation
    To create 8 subnets, we need to borrow enough host bits to accommodate 8 subnets. The network address 172.16.0.0/16 has 16 bits for the network portion. To determine how many host bits need to be borrowed, we need to find the smallest power of 2 that is greater than or equal to 8. In this case, 2^3 = 8, so we need to borrow 3 host bits to create 8 subnets.

    Rate this question:

  • 40. 

    For the network diagram and routing information, what path is taken by a message traveling from PCO to PC1? All Masks are 255.255.255.0. 

    • A.

      Router0, Router2, Router3, PC1 

    • B.

      Router0, Router1, Router3, PC1 

    • C.

      Router0, Router1, Router2, Router3, PC1 

    • D.

      Router3 goes back to Router1 so the packet will loop 

    Correct Answer
    B. Router0, Router1, Router3, PC1 
    Explanation
    The message traveling from PC0 to PC1 takes the path Router0, Router1, Router3, PC1. This is because the routers are connected in a sequential manner, and the message needs to pass through each router in order to reach its destination. The given routing information and network diagram do not indicate any loops or alternative paths, so the message follows the straightforward path from Router0 to Router1, then to Router3, and finally to PC1.

    Rate this question:

  • 41. 

    For the network diagram shown, the MAC Address Tables of the Switches are empty. What is the entry in the MAC address table of Switch1 after the message from PCO arrives at PC1? 

    • A.

      Port=P0. MAC Address=00-01-0e 

    • B.

      Port=P0, MAC Address=00-01-0a 

    • C.

      Port=P0, MAC Address=00-01-0d 

    • D.

      Port=P0, MAC Address=00-01-0a AND MAC Address=00-01-0e 

    • E.

      Port=P1, MAC Address=00-01-Of 

    Correct Answer
    A. Port=P0. MAC Address=00-01-0e 
  • 42. 

    Given 210.10.10.121 and a subnet mask with 28 bits, find the subnet number to which the host belongs. 

    • A.

      10

    • B.

      9

    • C.

      7

    • D.

      6

    • E.

      8

    Correct Answer
    C. 7
    Explanation
    The given IP address is 210.10.10.121 and the subnet mask has 28 bits. The subnet mask with 28 bits means that the first 28 bits of the IP address are used to identify the network and the remaining 4 bits are used to identify the host within that network.

    To find the subnet number to which the host belongs, we need to look at the last 4 bits of the IP address. In this case, the last 4 bits are 1101.

    Converting this binary number to decimal gives us 13. Therefore, the subnet number to which the host belongs is 13, which corresponds to option 7.

    Rate this question:

  • 43. 

    Convert the host portion of this IP Address to binary: 25.125.32.119/24 

    • A.

      00011001

    • B.

      01111101

    • C.

      011110111

    • D.

      None of these

    Correct Answer
    C. 011110111
    Explanation
    The correct answer is 011110111. To convert the host portion of the IP address to binary, we look at the subnet mask (/24) which indicates that the first 24 bits are for the network portion and the remaining 8 bits are for the host portion. The host portion of the IP address is 32.119, so we convert 32 and 119 to binary. 32 is 00100000 and 119 is 01110111. Therefore, the binary representation of the host portion is 00100000.01110111, which simplifies to 011110111.

    Rate this question:

  • 44. 

    A packet is sent from PCO to PC 1 with the TTL field set to 1. Where will the packet be dropped? 

    • A.

      PC1

    • B.

      PC0

    • C.

      Switch0

    • D.

      Router1

    • E.

      Router0

    Correct Answer
    E. Router0
    Explanation
    The packet will be dropped at Router0. The TTL (Time to Live) field in a packet is used to limit the number of hops a packet can take before it is discarded. When the TTL field is set to 1, it means that the packet can only travel to the immediate next hop before being dropped. In this scenario, the packet is sent from PCO to PC1, but since the TTL is set to 1, it will be dropped at Router0, which is the first router it encounters.

    Rate this question:

  • 45. 

    What is the second last host address for the following network address: 10.205.53.32/27

    • A.

      10.205.53.63 

    • B.

      10.205.53.61 

    • C.

      10.205.53.64 

    • D.

      10.205.53.62 

    Correct Answer
    B. 10.205.53.61 
    Explanation
    The given network address is 10.205.53.32/27, which means it has a subnet mask of 27 bits. The subnet mask of 27 bits gives us a block size of 32 (2^5), so the network address is divided into blocks of 32 IP addresses. The second last host address in this network would be 10.205.53.61, as it falls within the range of the network address.

    Rate this question:

  • 46. 

    What is the purpose of the Network Layer?

    • A.

      Routing: Determine the path to reach relevant destination networks. 

    • B.

      Forwarding: Move an incoming packet to the next hop Router interface.

    • C.

      Switching: Move an incoming frame to the outgoing interface.

    • D.

      ACK/NACK: Send an acknowledgment when a packet is received. 

    • E.

      Reordering: ensure that packets arrive in the same order they were sent.

    Correct Answer(s)
    A. Routing: Determine the path to reach relevant destination networks. 
    B. Forwarding: Move an incoming packet to the next hop Router interface.
    Explanation
    The purpose of the Network Layer is to determine the path to reach relevant destination networks, which is known as routing. It also involves moving an incoming packet to the next hop Router interface, which is called forwarding. This layer is responsible for making decisions on how to best route data packets across different networks to reach their intended destinations.

    Rate this question:

  • 47. 

    For the subnet ID 192.169.64.0/24, what is the directed broadcast address? 

    Correct Answer(s)
    192.169.64.255
    Explanation
    The directed broadcast address is the highest address in a subnet, where all the devices in that subnet can receive broadcast messages. In this case, the subnet ID is 192.169.64.0/24, which means the subnet has a range of 256 IP addresses. The directed broadcast address is calculated by setting all host bits to 1 in the subnet ID. Therefore, the directed broadcast address for this subnet is 192.169.64.255.

    Rate this question:

  • 48. 

    What is the second host address for the following network address: 10.205.53.32/27? 

    • A.

      10.205.53.33

    • B.

      10.205.53.31

    • C.

      10.205.53.34

    • D.

      10.205.53.32

    Correct Answer
    C. 10.205.53.34
    Explanation
    The given network address is 10.205.53.32/27. This means that the first 27 bits are the network address and the remaining 5 bits are for host addresses. To find the second host address, we increment the host address by 1. Therefore, the second host address would be 10.205.53.33. However, in the given options, the second host address is incorrectly listed as 10.205.53.34.

    Rate this question:

  • 49. 

    An IPv4 address has how many octets?

    Correct Answer
    4
    Explanation
    An IPv4 address is made up of four octets. Each octet consists of 8 bits, allowing for a total of 32 bits in an IPv4 address. The four octets are separated by periods, and each octet can have a value ranging from 0 to 255. This format allows for a unique identification of devices connected to a network using IPv4 addressing scheme.

    Rate this question:

  • 50. 

    Using the network in the diagram, what would be the default gateway address for host A in the 192.133.219.0 network? 

    • A.

      192.133.219.0

    • B.

      192.135.250.1

    • C.

      192.31.7.1

    • D.

      192.133.219.1

    Correct Answer
    D. 192.133.219.1
    Explanation
    The default gateway address for host A in the 192.133.219.0 network would be 192.133.219.1.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 12, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 19, 2019
    Quiz Created by
    Rockayoub13
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.