Toughest Networking Trivia Questions Quiz! Practice Test

126 Questions | Total Attempts: 158

SettingsSettingsSettings
Please wait...
Toughest Networking Trivia Questions Quiz! Practice Test

Below is the toughest networking trivia questions quiz that is perfectly designed for all those who think that they know all there is to networking. Do give it a shot and get to see how well you informed are and what you are yet to learn about networking. All the best, and keep an eye out for more quizzes just like it!


Questions and Answers
  • 1. 
    To directly open the Windows Network Connections Control Panel you can use Start -> Run and enter _______ [command] into the dialog box.
  • 2. 
    From a command prompt window, you can determine the current network settings for your PC. Which of the following commands will display the IP addresses assigned to each NIC on your Windows laptop?
    • A. 

      Ipconfig

    • B. 

      Ipconfig /showdns

    • C. 

      Netstat -r

  • 3. 
    You have just finished configuring the IP address on your workstation. Your gateway address is 172.16.255.254. What command would you enter to test that the gateway is reachable?
  • 4. 
    What type of Ethernet cable is used to connect the Linksys router to the Laptop computer?
    • A. 

      Rollover Cable

    • B. 

      Straight-through

    • C. 

      Cross-over

    • D. 

      Co-axial

  • 5. 
    Referring to the IPv4 adapter configuration presented in the above image, what type of IPv4 the address will be assigned to the network adapter (static or dynamic)? Note: a static address is entered manually while the dynamic is obtained automatically via DHCP.
  • 6. 
    Running the command to find out what IP address has been assigned to your network adapter reveals an IP address of 169.254.10.22. Can you conclude that your network adaptor has successfully acquired an address from the DHCP server?
    • A. 

      True

    • B. 

      False

  • 7. 
    What Application Layer protocol is being sent in frame #4?
    • A. 

      IP

    • B. 

      TCP

    • C. 

      DNS

    • D. 

      HTTP

  • 8. 
    Which protocol implements a ping request and replies?
    • A. 

      ICMP

    • B. 

      IP

    • C. 

      Echo Request / Echo Reply 

    • D. 

      Client / Server

  • 9. 
    What PDU is encapsulated at the Network Layer?
    • A. 

      A Segment is encapsulated at the Network Layer.

    • B. 

      A Packet is encapsulated at the Network Layer.

    • C. 

      Frame is encapsulated at the Network Layer

    • D. 

      Data is encapsulated at the Network Layer.

  • 10. 
    Which network device(s) break the collision domain?
    • A. 

      Router and Ethernet Switch

    • B. 

      Ethernet Switch only

    • C. 

      Ethernet Switch and Hub

    • D. 

      None of the above

  • 11. 
    Why do network devices need two layers of addressing, Data Link Layer Address (i.e. Ethernet) and a Network Layer Address (i.e. IP Address)?
    • A. 

      A Network Layer Address is used to forward the packet from one network segment to another network segment. The Data Link Address is used to forward the frame from one device to another within the network segment.

    • B. 

      The IP Address can be used to forward packets to the final destination but historically Ethernet was developed first so it continues to be used for Data Link Addressing

    • C. 

      A Data Link Layer Address is used to forward the packet from one network segment to another network segment. The Network Layer Address is used to forward the frame from one device to another within the network segment

    • D. 

      Since MAC addresses are unique, a Data Link Layer Addresses can be used to forward frames to any destination. A Network Layer Address is logical a can only be used to send data to a destination on the same network segment

  • 12. 
    What is a LAN?
    • A. 

      Local Area Networks are typically within a building and connect office workers to servers.

    • B. 

      Local Area Networks typically connect users within a single room.

    • C. 

      Local Area Networks are used to connect an organization's network segments which are located in different cities.

    • D. 

      Local Area networks cover a geographic area roughly the size of a city.

    • E. 

      None of these answers are correct.

  • 13. 
    What is Encapsulation?
    • A. 

      It is the process of adding a protocol header and sometimes a trailer to a block of application data.

    • B. 

      It is the process of removing the data portion of the PDU and passing it up to the next higher layer.

    • C. 

      It is the process of obtaining a MAC addresses which corresponds to a given IP address.

    • D. 

      It is the process of obtaining an IP addresses which corresponds to a given MAC address

  • 14. 
    What is Message Segmentation?
    • A. 

      Segmentation is the process of breaking the application data stream into pieces or blocks of data

    • B. 

      Segmentation is the process where devices communicate in both directions at the same time.

    • C. 

      Segmentation is the process which allows data to be delivered to a destination on a different network.

    • D. 

      Segmentation allows a server to determine which service the data should be directed to.

  • 15. 
    This picture is an example of ________ Duplex communication.
  • 16. 
    How many bits and Hex digits does the MAC Address have?
    • A. 

      48 bits (12 Hex digits)

    • B. 

      48 bits (18 Hex digits)

    • C. 

      MAC Addresses don't use Hex digits

    • D. 

      24 bits (6 Hex digits)

    • E. 

      32 bits (18 Hex digits)

  • 17. 
    What is the basic operation of an Ethernet Switch?
    • A. 

      After a frame arrives at a switch port, the Switch looks up the destination MAC address in the MAC Address Table to determine on which port to send the frame and then sends the frame.

    • B. 

      After a frame arrives at a switch port, the Switch looks up the destination MAC address in the Routing Table to determine on which port to send the frame and then sends the frame

    • C. 

      After a packet arrives at a switch port, the Switch looks up the source MAC address in the MAC Address Table to determine on which port to send the frame and then sends the frame

    • D. 

      After a frame arrives at a switch port, the Switch looks up the destination MAC address in the arp table to determine on which port to send the frame and then sends the frame

    • E. 

      All the above are variations of the correct basic operation

  • 18. 
    What happens to an incoming frame if the Switch doesn't have an entry for the Destination Address in its MAC Address Table?
    • A. 

      The frame is sent out all ports except the ingress port (original incoming port)

    • B. 

      The frame is dropped until it learns the correct port from the source address of an incoming frame.

    • C. 

      The frame is sent out all ports in an attempt to reach the destination device

    • D. 

      The switch sends an ARP request and the device with the destination MAC address responds

    • E. 

      Switches populate the MAC Address Table by observing the Source MAC Address of all incoming frames

  • 19. 
    How does the Switch learn on which port a device is connected?
    • A. 

      When a device sends a frame via a Switch, the Switch reads the Source MAC Address of the frame and enters it into the MAC Address Table together with the physical port number on which the frame arrived

    • B. 

      This is usually done by the network administrator by statically adding the information to the MAC Address Table

    • C. 

      When a device sends a frame via a Switch, the Switch reads the Destination MAC Address of the frame and enters it into the MAC Address Table together with the physical port number on which the frame arrived.

    • D. 

      When a device sends a frame via a Switch, the Switch reads the Source IP Address of the frame and enters it into the MAC Address Table together with the port number on which the frame arrived. 

  • 20. 
    Which of these are Intermediary Devices?
    • A. 

      Switch

    • B. 

      Router

    • C. 

      PC

    • D. 

      Tablet

    • E. 

      VoiP Phone

  • 21. 
    The network diagram shows the simplified MAC address next to their respective interfaces. PCO sends a message to PC I. To which MAC Address does PCO send the frame? 
    • A. 

      00-01-0b

    • B. 

      00-01-0c

    • C. 

      00-01-0d

    • D. 

      00-01-0e

    • E. 

      00-01-0f

  • 22. 
    What is the difference between the OSI Protocol Stack Model and the TCP/IP Stack Model? 
    • A. 

      The OSI Model has 4 layers whereas the TCP/IP Model has 7 layers.

    • B. 

      The TCP/IP Model was developed for the TCP and IP protocols whereas the OSI Model is generic

    • C. 

      The OSI Model was developed by the IETF whereas the TCP/IP Model was developed by the ITU standards body

    • D. 

      Layer 3 of the TCP/IP Model is the Transport layer whereas layer 2 of the OSI Model is the Transport layer

  • 23. 
    Which command can be used to test connectivity between two computers that are a5ached to a network?
    • A. 

      Ipconfig

    • B. 

      Ping

    • C. 

      Winipcfg

    • D. 

      Ifconfig

    • E. 

      Netstat -s

  • 24. 
    What is the OUI of this MAC Address: 00-18-23-1a-45-0b?
    • A. 

      00-18-23

    • B. 

      00-18-23-00-00-00

    • C. 

      1a-45-0b

    • D. 

      00-00-00-1a-45-0b

    • E. 

      Option 5FF-FF-FF-FF-FF-FF

  • 25. 
    PC0 needs to send a frame to PC1. PC0 broadcasts an ARP request to learn the MAC address of which device?
    • A. 

      Switch0

    • B. 

      PC1

    • C. 

      Router0

    • D. 

      Router1

  • 26. 
    Which layer encapsulates the Network Layer PDU? 
    • A. 

      Data Link

    • B. 

      Transport

    • C. 

      Physical

    • D. 

      Application

    • E. 

      Network

  • 27. 
    Which field in the IPv4 header Is used to prevent a packet from traversing a network endlessly? 
    • A. 

      Time-to-Live 

    • B. 

      Sequence Number

    • C. 

      Acknowledgment Number

    • D. 

      Differentiated Services 

  • 28. 
    Convert 255.255.255.192 to prefix/slash notation. 
  • 29. 
    Convert the following binary number to decimal: 11100111 
    • A. 

      125

    • B. 

      231

    • C. 

      236

    • D. 

      118

  • 30. 
    What is the second last host address for the following network address: 10.23.100.64/26 
    • A. 

      10.23.100.193 

    • B. 

      10.23.100.125 

    • C. 

      10.23.100.64 

    • D. 

      10.23.100.65 

  • 31. 
    Convert the following decimal number to Hex: 147 All answers shown are In Hex. 
    • A. 

      A6

    • B. 

      9c

    • C. 

      93

    • D. 

      D4

  • 32. 
    How many usable host addresses are contained in this network address: 192.168.1.0/31? 
    • A. 

      4

    • B. 

      0

    • C. 

      2

    • D. 

      8

  • 33. 
    What are the reasons a network administrator might want to create subnets?
    • A. 

      Simplifies network design 

    • B. 

      Improves network performance 

    • C. 

      Easier to implement security policies 

    • D. 

      Reduction in the number of switches needed 

    • E. 

      Reduction in the number of routers needed 

  • 34. 
    Consider the Switch and its MAC Address Table shown in the Figure. PC-A sends a frame to PC-B. How does the Switch know on which port to send the frame? 
    • A. 

      The switch broadcasts an ARP request for the destination device. When the destination device responds with the ARP reply, the switch learns on which port the destination port is connected. 

    • B. 

      The Switch does not know where to send the frame and drops it until it can learn the correct port. 

    • C. 

      The MAC Address Table must be statically configured with the correct information. 

    • D. 

      The MAC Address table is populated with the MAC Address-to-Port mapping information and the switch uses this information to select the outgoing port.

    • E. 

      The Switch broadcasts the frame on all ports except the one connected to PCA. 

  • 35. 
    What is the network address for the following host address: 172.16.25.130 and mask: 255.255.255.128?
    • A. 

      172.16.25.192 

    • B. 

      172.16.25.0 

    • C. 

      172.16.25.128 

    • D. 

      172.16.25.130 

  • 36. 
    What happens to an incoming frame if the Switch doesn't have an entry for the Destination Address in its MAC Address Table? 
    • A. 

      The frame is sent out all ports except the ingress port (original incoming port) 

    • B. 

      Switches populate the MAC Address Table by observing the Source MAC Address of all incoming frames. 

    • C. 

      The switch sends an ARP request and the device with the destination MAC address responds. 

    • D. 

      The frame is sent out all ports in an attempt to reach the destination device. 

    • E. 

      The frame is dropped until it learns the correct port from the source address of an incoming frame. 

  • 37. 
    What is the purpose of the subnet mask in conjunction with an IP address? 
    • A. 

      To identify whether the address is public or private 

    • B. 

      To determine the subnet to which the host belongs 

    • C. 

      To uniquely identify a host on a network 

    • D. 

      To mask the IP address to outsiders 

  • 38. 
    Convert /17 to decimal notation
  • 39. 
    Given the network address 172.16.0.0 16, how many host bits need to be borrowed to create 8 subnets? 
    • A. 

      2

    • B. 

      3

    • C. 

      4

    • D. 

      5

  • 40. 
    For the network diagram and routing information, what path is taken by a message traveling from PCO to PC1? All Masks are 255.255.255.0. 
    • A. 

      Router0, Router2, Router3, PC1 

    • B. 

      Router0, Router1, Router3, PC1 

    • C. 

      Router0, Router1, Router2, Router3, PC1 

    • D. 

      Router3 goes back to Router1 so the packet will loop 

  • 41. 
    For the network diagram shown, the MAC Address Tables of the Switches are empty. What is the entry in the MAC address table of Switch1 after the message from PCO arrives at PC1? 
    • A. 

      Port=P0. MAC Address=00-01-0e 

    • B. 

      Port=P0, MAC Address=00-01-0a 

    • C. 

      Port=P0, MAC Address=00-01-0d 

    • D. 

      Port=P0, MAC Address=00-01-0a AND MAC Address=00-01-0e 

    • E. 

      Port=P1, MAC Address=00-01-Of 

  • 42. 
    Given 210.10.10.121 and a subnet mask with 28 bits, find the subnet number to which the host belongs. 
    • A. 

      10

    • B. 

      9

    • C. 

      7

    • D. 

      6

    • E. 

      8

  • 43. 
    Convert the host portion of this IP Address to binary: 25.125.32.119/24 
    • A. 

      00011001

    • B. 

      01111101

    • C. 

      011110111

    • D. 

      None of these

  • 44. 
    A packet is sent from PCO to PC 1 with the TTL field set to 1. Where will the packet be dropped? 
    • A. 

      PC1

    • B. 

      PC0

    • C. 

      Switch0

    • D. 

      Router1

    • E. 

      Router0

  • 45. 
    What is the second last host address for the following network address: 10.205.53.32/27
    • A. 

      10.205.53.63 

    • B. 

      10.205.53.61 

    • C. 

      10.205.53.64 

    • D. 

      10.205.53.62 

  • 46. 
    What is the purpose of the Network Layer?
    • A. 

      Routing: Determine the path to reach relevant destination networks. 

    • B. 

      Forwarding: Move an incoming packet to the next hop Router interface.

    • C. 

      Switching: Move an incoming frame to the outgoing interface.

    • D. 

      ACK/NACK: Send an acknowledgment when a packet is received. 

    • E. 

      Reordering: ensure that packets arrive in the same order they were sent.

  • 47. 
    For the subnet ID 192.169.64.0/24, what is the directed broadcast address? 
  • 48. 
    What is the second host address for the following network address: 10.205.53.32/27? 
    • A. 

      10.205.53.33

    • B. 

      10.205.53.31

    • C. 

      10.205.53.34

    • D. 

      10.205.53.32

  • 49. 
    An IPv4 address has how many octets?
  • 50. 
    Using the network in the diagram, what would be the default gateway address for host A in the 192.133.219.0 network? 
    • A. 

      192.133.219.0

    • B. 

      192.135.250.1

    • C. 

      192.31.7.1

    • D. 

      192.133.219.1

  • 51. 
    For the following network diagram, how many Destination Ethernet Addresses are required to send a message from PCO to PC1? 
    • A. 

      5

    • B. 

      4

    • C. 

      2

    • D. 

      3

    • E. 

      1

  • 52. 
    For the subnet ID 192.169.44.0/24, what is the second last host address? 
  • 53. 
    Convert this Subnet Mask to Dotted Decimal Notation: /27 
    • A. 

      255.255.255.192

    • B. 

      255.255.255.128

    • C. 

      255.255.255.0

    • D. 

      255.255.255.224

  • 54. 
    Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit? 
    • A. 

      255.255.255.240

    • B. 

      255.255.255.0

    • C. 

      255.255.255.224

    • D. 

      255.255.255.128

    • E. 

      255.255.255.192

  • 55. 
    After PCO sends the message to PC1 in the following diagram, what is the entry in PCO's ARP Table? 
    • A. 

      IP Addr=192.168.3.2; MAC-Addr=00-01-0f 

    • B. 

      IP Addr=192.168.1.2; MAC-Addr=00-01-0b 

    • C. 

      IP Addr=192.168 1 2; MAC-Addr=00-01-0a 

    • D. 

      IP Addr=192.168.1 1; MAC-Addr=00-01-0b 

    • E. 

      IP Addr=192.168.1.1; MAC-Addr=00-01-0b AND IP Addr=192.168.3.2; MAC-Addr=00-01-0f 

  • 56. 
    Select the IPv6 link local address
    • A. 

      Fe80::2001:fe6c:1/64

    • B. 

      2001:db8:0:aa20:5b6e::1/64

    • C. 

      Fe80::4f20:0:hf6c:1/64

    • D. 

      Fe80/10

  • 57. 
    Select the transport layer protocols (select 2).
    • A. 

      Transmission Control Protocol

    • B. 

      User Datagram Protocol

    • C. 

      Transport Layer Transfer Protocol

    • D. 

      File Transfer Protocol

  • 58. 
    Subnet ID 10.5.22.0/26 was created by borrowing two bits. The mask already includes the borrowed bits. What is the subnet 0 ID.
  • 59. 
    Subnet ID 10.5.22.0/26 was created by borrowing two bits. The mask already includes the borrowed bits. What is the subnet 3 ID.
  • 60. 
    To reset a LinkSys E2500 SOHO router back to the factory default settings you need to:
    • A. 

      Press the reset button on the back of the router (near the power connection) for a total of 30-60 seconds

    • B. 

      Login into the router and enter a special password to reset it to factory defaults

    • C. 

      Press and hold the reset button, located on the bottom of the router, for 5-10 seconds until the all the port lights flash at the same !me

    • D. 

      This is a trick question. The router cannot be reset to factory defaults

  • 61. 
    Two devices are directly connected by an Ethernet link. Both devices can communicate with each other without collisions. The duplex setting of their link is.
  • 62. 
    Uncompress the following IPv6 address: 2001:0:0:aa20::1/64. Include the mask information?
  • 63. 
    What best describes the function of the Application Layer from the TCP/IP model?
    • A. 

      Message routing.

    • B. 

      Segmentation and reassembly of messages

    • C. 

      Defines the content and formatting of client requests and server responses.

    • D. 

      Media Access Control.

  • 64. 
    What information is stored in the Switch's MAC Address Table? (Select two)
    • A. 

      Current Date and Time

    • B. 

      Switch Port Number

    • C. 

      Attached Device's IP Address

    • D. 

      Attached Device's MAC Address

    • E. 

      Attached Device Type (i.e. PC, VoIP, Video)

  • 65. 
    What is a "socket" in the context of networking?
    • A. 

      Combination of IP address and port number.

    • B. 

      Combination of source and destination port numbers.

    • C. 

      For TCP only, it is a combination of IP address and port number

  • 66. 
    What is a Protocol Data Unit called at the network layer?
    • A. 

      Segment

    • B. 

      Packet

    • C. 

      Frame

    • D. 

      Block

    • E. 

      Byte

  • 67. 
    What is the Transport layer PDU called?
    • A. 

      Packet

    • B. 

      Frame

    • C. 

      Segment

    • D. 

      Block

  • 68. 
    What is the difference between a dynamic IP address and a static IP address? Select the most correct answer.
    • A. 

      A dynamic IP address requires the use of DNS whereas a static IP address requires the use of DHCP.

    • B. 

      A dynamic IP address is always obtained from the connected router whereas a static IP address is manually configured.

    • C. 

      A dynamic IP address is manually configured whereas a sta!c IP address is obtained from the DHCP server.

    • D. 

      A dynamic IP address is obtained from a DHCP server whereas a static IP address is manually configured

    • E. 

      A dynamic IP address is of the form 169.254.x.x whereas a sta!c IP address is in the form of X.X.X.X where X a decimal value between 0 and 255.

  • 69. 
    What is the first host address for the following network address: 10.23.100.64/26
    • A. 

      10.23.100.193

    • B. 

      10.23.100.63

    • C. 

      10.23.100.64

    • D. 

      10.23.100.65

  • 70. 
    What is the format of a Broadcast MAC Address?
    • A. 

      23-af-56-b4-9c-4e

    • B. 

      FF-FF-FF-FF-FF-FF

    • C. 

      BR-OA-DC-AS-T0-00

    • D. 

      00-00-00-00-00-00

  • 71. 
    What is the function of the Physical Layer Protocol?
    • A. 

      It includes the user I/O devices such as keyboard and monitor

    • B. 

      It opens, closes and manages sessions

    • C. 

      It manages the network device to network device link connection

    • D. 

      It performs formatting of data to the user

    • E. 

      It is responsible for the transmission of bits on the physical medium.

  • 72. 
    What is the minimum size of an Ethernet frame?
    • A. 

      56 bytes

    • B. 

      64 bytes

    • C. 

      128 bytes

    • D. 

      1024 bytes

  • 73. 
    What is the primary purpose of the ping utility? Select the most correct answer.
    • A. 

      It is used to check if the default gateway has been configured.

    • B. 

      It is used to test layer 3 connectivity to the interface on another network device.

    • C. 

      It is intended to be used with Wireshark.

    • D. 

      It is part of the ICMP suite of utilities

    • E. 

      It is used to generate an alert tone on a remote device.

  • 74. 
    What is the process of enclosing a block of data in a protocol header and trailer called?
    • A. 

      De-encapsulation

    • B. 

      Decapsulation

    • C. 

      Segmentation

    • D. 

      Encapsulation

    • E. 

      Registration

  • 75. 
    What is the purpose of the DNS application?
    • A. 

      Translate a private IP address into a public IP address

    • B. 

      Translate a private host name (ie URL) into a public host name (ie URL)

    • C. 

      Translate a host name (ie URL) into an IP address

    • D. 

      All of the above

  • 76. 
    What is the difference between a default gateway and default route?
    • A. 

      An end device (i.e. PC) uses the default gateway whereas a router uses a default route.

    • B. 

      An end device (i.e. PC) uses the default route whereas a router uses a default gateway.

    • C. 

      Both terms are used inter-changeably.

    • D. 

      An end device (i.e. PC) uses the default gateway whereas a router and an Ethernet Switch use a default route.

  • 77. 
    In the context of the protocol stack, what is a peer-level conversation?
    • A. 

      There is no such concept.

    • B. 

      It is the conversation between the sender and receiver

    • C. 

      It is the communication between two peer layers of the protocol stack.

    • D. 

      It refers to peer-to-peer computing as distinct from client-server computing

    • E. 

      It is the communication between adjacent layers of the protocol stack

  • 78. 
    In IPv6, unicast, multicast and broadcast each have unique address formats.
    • A. 

      True

    • B. 

      False

  • 79. 
    How many functional layers are in the OSI protocol model?
    • A. 

      4

    • B. 

      5

    • C. 

      6

    • D. 

      7

    • E. 

      8

  • 80. 
    Given that IPv6 has a large address space, the IPv6 standard does not allow subnetting.
    • A. 

      True

    • B. 

      False

  • 81. 
    For the subnet ID 192.169.64.0/24 what is the last host address?
  • 82. 
    For the subnet ID 192.169.64.0/24 what is the first host address?
  • 83. 
    For the subnet ID 192.168.12.0/26, how many hosts addresses are available?
  • 84. 
    An interface on Router A is connected to an interface on Router B. What is Router A's default gateway? Select the most correct answer.
    • A. 

      It is the IP address of Router B's connected interface.

    • B. 

      It is the IP address of Router A's interface.

    • C. 

      It is the IP Address of Router B

    • D. 

      It is a Virtual Address used for Routing purposes

    • E. 

      The default gateway is only used when the actual gateway has not been configured.

  • 85. 
    A standard global unicast IPv6 address has the following parameters: Global Routing Prefix=2001:acad:0:, an Interface ID=d5 and a subnet ID=1. Enter the uncompressed IPv6 address including the mask information.
  • 86. 
    A packet is sent from a PC in network segment A to a PC in network segment B. Answer the following two questions: i) Does the network layer destination address change or stay the same as the packet moves across the network? ii) Does the data link layer destination address change or stay the same as it moves across the network?
    • A. 

      I) change ii) change

    • B. 

      I) stay the same ii) change

    • C. 

      I) change ii) stay the same

    • D. 

      I) stay the same ii) stay the same

  • 87. 
    A network consists of end-devices, network devices and media. Select the end devices from the following list. (select three)
    • A. 

      Router

    • B. 

      Laptop Computer

    • C. 

      Ethernet Switch

    • D. 

      Printer

    • E. 

      Wireless Phone

  • 88. 
    A PC sends a TCP segment to a Web application using source port=53000 and destination port=443. What destination port number does the Web server use on the reply?
    • A. 

      53000

    • B. 

      80

    • C. 

      443

    • D. 

      Random value

  • 89. 
    A PC sends a TCP Window size of 0. What does this mean?
    • A. 

      The PC can receive unlimited data

    • B. 

      The PC cannot receive any data.

    • C. 

      The PC will stop sending a data.

    • D. 

      The PC will send unlimited data.

  • 90. 
    What is the last host address for the following network address: 10.205.53.32/27?
    • A. 

      10.205.53.62

    • B. 

      10.205.53.63

    • C. 

      10.205.53.64

    • D. 

      10.205.53.61

  • 91. 
    What is the first host address for the following network address: 10.205.53.32/27 ?
    • A. 

      10.205.53.33

    • B. 

      10.205.53.34

    • C. 

      10.205.53.31

    • D. 

      10.205.53.32

  • 92. 
    How many host addresses are contained in this network address: 192.168.1.0/30 ?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 93. 
    Convert the host portion of this IP Address to binary: 25.125.32.235/24
    • A. 

      00011001

    • B. 

      01111101

    • C. 

      :eb

    • D. 

      11101011

  • 94. 
    Convert the following binary number to decimal: 0101001
    • A. 

      41

    • B. 

      36

    • C. 

      25

    • D. 

      18

  • 95. 
    What is the purpose of the Offer message in the DHCP sequence?
    • A. 

      The DHCP server offers an IP address to prevent other servers from making another offer using the same IP address

    • B. 

      The DHCP server offers an IP address to prevent other servers from making another offer

    • C. 

      The requesting node offers an IP address that it would like to receive

    • D. 

      The DHCP server offers an IP address to the requesting node

  • 96. 
    What is the purpose of the Sequence Number and Acknowledgement Numbers in the UDP protocol?
    • A. 

      Reliable, Ordered Delivery

    • B. 

      Bandwidth Measurement

    • C. 

      None

    • D. 

      Track Bytes Transferred

  • 97. 
    What is the purpose of the link local address?
    • A. 

      It is only used in a network segment and is non routable.

    • B. 

      It is a unique address which is routable.

    • C. 

      It is only used in a network segment and is routable.

    • D. 

      This is equivalent to the IPv4 address 168.254.0.0.

  • 98. 
    What is the value of TCP being connection-oriented?
    • A. 

      It allows the two end points to manage the connection with such services as reliability and flow control.

    • B. 

      It only allows each side to reference specific destination end-point.

    • C. 

      It gives the connection, wire-connected properties to improve bandwidth.

    • D. 

      It permits the end-user to be identified by a port number.

  • 99. 
    What is true concerning physical and logical topologies?
    • A. 

      The logical topology is always the same as the physical topology

    • B. 

      Physical topologies are concerned with how a network transfers frames.

    • C. 

      Physical topologies display the IP addressing scheme of each network.

    • D. 

      Logical topologies refer to how a network transfers data between devices.

  • 100. 
    What message sequence does TCP use to establish a session?
    • A. 

      Three-way handshake: syn, syn-ack, ack

    • B. 

      Fin, ack, fin, ack

    • C. 

      Four-way handshake: syn, syn-ack, syn, syn-ack

    • D. 

      Three-way handshake: syn, syn-ack, syn, syn-ack

  • 101. 
    What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
    • A. 

      .com

    • B. 

      Www

    • C. 

      Http

    • D. 

      Index

  • 102. 
    When an application passes a block of data to the network interface, it also selects whether to send the data using TCP or UDP. Which types of applications use UDP? (select 2)
    • A. 

      Interactive applications including voice and video conferencing which are tolerant to small levels of loss

    • B. 

      File transfer applications which require zero data loss and no disordering

    • C. 

      Short session, transactional applications such DNS and DHCP where the application can recover from packet loss.

    • D. 

      Applications which depend on the network for congestion and flow control

  • 103. 
    Which Protocol is Connection-Oriented?
    • A. 

      TCP

    • B. 

      UDP

    • C. 

      TLTP

    • D. 

      FTP

  • 104. 
    Which compression rule is correct?
    • A. 

      One set of contiguous hextets of zeros can be replaced with a double-colon.

    • B. 

      All sets of contiguous hextets of zeros can be replaced with a double-colon.

    • C. 

      The first set of contiguous hextets of zeros can be replaced with a double-colon.

    • D. 

      The longest set of contiguous hextets of zeros can be replaced with a double-colon

  • 105. 
    Which of the following correctly define what flags are used in a complete TCP connection setup?
    • A. 

      SYN, SYN+ACK, ACK

    • B. 

      ACK, ACK+SYN, SYN

    • C. 

      SYN, SYN, ACK

    • D. 

      SYN, ACK, FIN

    • E. 

      ACK, ACK, SYN

  • 106. 
    Which protocol implements the Media Access Control?
    • A. 

      CSMA/CA

    • B. 

      AXMA/CD

    • C. 

      CSAM/CD

    • D. 

      CSMA/CV

    • E. 

      CSMA/CD

  • 107. 
    Which switching method uses the CRC value in a frame?
    • A. 

      Cut-through

    • B. 

      Fast-forward

    • C. 

      Fragment-free

    • D. 

      Store-and-forward

  • 108. 
    Which three statements describe a DHCP Discover message? (Choose three.)
    • A. 

      The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).

    • B. 

      The destination IP address is 255.255.255.255.

    • C. 

      The message comes from a server offering an IP address.

    • D. 

      The message comes from a client seeking an IP address.

    • E. 

      All hosts receive the message, but only a DHCP server replies.

    • F. 

      Only the DHCP server receives the message.

  • 109. 
    Which topology scenarios may result in multiple MAC addresses being assigned to one Switch Port in the MAC Address Table? (select two)
    • A. 

      Multiple devices are connected to the same physical switch port.

    • B. 

      Two switches are connected together.

    • C. 

      This impossible and it means that there has been a MAC Address Table error

    • D. 

      An Ethernet hub is connected to a Switch port.

    • E. 

      A router is connected to a Switch port.

  • 110. 
    Which two definitions accurately describe the associated application layer protocol? (Choose two.)
    • A. 

      SMTP - transfers web pages from web servers to clients

    • B. 

      Telnet - provides remote access to servers and networking devices

    • C. 

      DNS - resolves Internet names to IP addresses

    • D. 

      FTP - transfers email messages and attachments

    • E. 

      HTTP - enables devices on a network to obtain IP addresses

  • 111. 
    Why does FTP use two port numbers?
    • A. 

      Port 21 is used for control traffic while port 20 is used for user data traffic

    • B. 

      Port 21 is used for user data traffic while port 20 is used for control traffic

    • C. 

      Two ports are used to increase the bandwidth of the connec!on

    • D. 

      Port 21 is the only port used for FTP

  • 112. 
    Why does HTTP have two well-known port numbers: 80 and 443?
    • A. 

      Port 80 is used for secured data transfer while port 443 is used for unsecured data transfer

    • B. 

      Port 80 is used for unsecured data transfer while port 443 is used for secured data transfer

    • C. 

      Both ports are for unsecured data transfer but allow for two web servers to run on a server simultaneously.

    • D. 

      Port 80 is the only well-known HTTP port number for the HTTP

  • 113. 
    Why does TCP use a sequence number in its header?
    • A. 

      To identify the application layer protocol

    • B. 

      To reassemble the segments in the correct order

    • C. 

      The sequence number is only used to initiate a TCP connection

    • D. 

      To show the maximum number of bytes allowed during a session

    • E. 

      To indicate the number of the next expected byte

  • 114. 
    Why is UDP best suited for real-!me, interactive applications such as voice and video?
    • A. 

      The TCP features introduce delay and retransmission which adds impairment to interactive communication and UDP does not.

    • B. 

      TCP is always the preferred protocol to use because of the features that make it robust.

    • C. 

      Because the UDP header is smaller which makes it faster to process.

    • D. 

      UDP includes features to synchronize the voice and video frames

  • 115. 
    URL is an acronym for?
    • A. 

      Uniform Resource Locator

    • B. 

      Unified Resource Locator

    • C. 

      Uniform Restore Locator

    • D. 

      Unified Restore Locator

  • 116. 
    Which class can be used to create a server socket. This object is used to establish communication with the clients?
    • A. 

      ServerSocket

    • B. 

      Socket

    • C. 

      Both A & B

    • D. 

      None of these anwsers

  • 117. 
    Which class is message that can be sent or received. If you send multiple packet, it may arrive in any order , Moreover, packet delivery is not guaranteed?
    • A. 

      DatagramPacket

    • B. 

      DatagramSocket

    • C. 

      Both A & B

    • D. 

      None of these anwsers

  • 118. 
    Which classes are used for connection-less socket programming? (choose the best answer)
    • A. 

      DatagramSocket

    • B. 

      DatagramPacket

    • C. 

      Both A & B

    • D. 

      None of these answers 

  • 119. 
    Which constructor of DatagramPacket class is used that it creates a datagram packet to send to a remote machine?
    • A. 

      DatagramPacket(byte[] buf, int length, InetAddress address, int port);

    • B. 

      DatagramPacket(byte[] buffer, int length);

    • C. 

      DatagramPacket()

    • D. 

      None of these anwsers

  • 120. 
    Which constructor of DatagramPacket class is used that it creates a datagram packet to receive an incoming UDP packet from a remote machine?
    • A. 

      DatagramPacket(byte[] buf, int length, InetAddress address, int port);

    • B. 

      DatagramPacket(byte[] buffer, int length);

    • C. 

      DatagramPacket()

    • D. 

      None of these anwsers

  • 121. 
    Which of these package contains classes and interfaces for networking?
    • A. 

      Java.io

    • B. 

      Java.util

    • C. 

      Java.net

    • D. 

      Java.network