MTA Networking Fundamentals 98-366 Exam Practice Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Shorty2cool68
S
Shorty2cool68
Community Contributor
Quizzes Created: 1 | Total Attempts: 24,455
Questions: 27 | Attempts: 24,455

SettingsSettingsSettings
MTA Networking Fundamentals 98-366 Exam Practice Test - Quiz

Welcome to the ultimate preparation test for the Microsoft Technology Associate certification exam. This quiz will test your skills in Networking Fundamentals that you have learned so far. Try to score as much as you can, there is no time limit.


Questions and Answers
  • 1. 

    A client has requested a network setup for his home. The network has to be cost-effective, and easy to extend and implement. Further more, the client wants his workstations connected by a single cable. Which of the following network topologies should you use?

    • A.

      A star network topology.

    • B.

      A bus network topology.

    • C.

      A mesh network topology.

    • D.

      A ring network topology.

    Correct Answer
    B. A bus network topology.
    Explanation
    A bus network topology would be the most suitable option for the client's requirements. In a bus network, all workstations are connected to a single cable, which makes it cost-effective and easy to extend. It is also relatively simple to implement.

    Rate this question:

  • 2. 

    You have recently designed a home office network for a client that includes a switch. Which of the following are TRUE with regards to network switches?

    • A.

      It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached.

    • B.

      It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which it is attached.

    • C.

      It operates at the Physical layer of the OSI model.

    • D.

      It operates at the Data-Link layer of the OSI model.

    Correct Answer
    A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached.
    Explanation
    A network switch keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which it is attached. This means that when a device sends data to a specific MAC address, the switch will forward that data only to the port where the device with that MAC address is connected. This helps to optimize network performance and reduce unnecessary traffic on the network.

    Rate this question:

  • 3. 

    As part of a training exercise, you have been asked to identify the layer that allows applications and a number of useful functions access to the network. Which of the following options represents your response?

    • A.

      The document layer.

    • B.

      The application layer.

    • C.

      The system layer.

    • D.

      The Data-link layer.

    Correct Answer
    B. The application layer.
    Explanation
    The application layer is responsible for providing access to network resources for applications and enabling them to perform useful functions. This layer interacts directly with the software applications and provides services such as file transfer, email services, and remote login. It ensures that the data exchanged between applications is properly formatted and understood by both ends.

    Rate this question:

  • 4. 

    You have been tasked with making sure that a client's network includes a server that converts NetBIOS names to IP addresses. Which of the following actions should you take?

    • A.

      You should consider adding a DHCP server to the client's network.

    • B.

      You should consider adding a DNS server to the client's network.

    • C.

      You should consider adding a Web server to the client's network.

    • D.

      You should consider adding a WINS server to the client's network.

    Correct Answer
    D. You should consider adding a WINS server to the client's network.
    Explanation
    To convert NetBIOS names to IP addresses, a WINS (Windows Internet Name Service) server is required. WINS is a legacy name resolution protocol used in older versions of Windows. It resolves NetBIOS names to IP addresses, allowing devices on the network to communicate with each other using NetBIOS names. Adding a DHCP server provides IP addresses to devices on the network, a DNS server resolves domain names to IP addresses, and a web server hosts websites. However, in this case, the specific requirement is to convert NetBIOS names to IP addresses, which can be achieved by adding a WINS server.

    Rate this question:

  • 5. 

    A clients network is made up of two network segments, named Subnet A and Subnet B. DHCP clients are located on Subnet A. A DHCP server on Subnet B. You need to make sure that DHCP clients are able to connect to the server. Which of the following actions should you take?

    • A.

      You should make sure that the RRAS service is configured.

    • B.

      You should make sure that WEb service is configured.

    • C.

      You should make sure that the DNS service is configured.

    • D.

      You should make sure that the DHCP relay agent service is configured.

    Correct Answer
    D. You should make sure that the DHCP relay agent service is configured.
    Explanation
    The correct answer is to make sure that the DHCP relay agent service is configured. This is because the DHCP clients are located on Subnet A, while the DHCP server is on Subnet B. The DHCP relay agent allows DHCP messages to be forwarded between different subnets, ensuring that the clients on Subnet A can connect to the server on Subnet B and receive the necessary IP configuration.

    Rate this question:

  • 6. 

    You are in the process of designing an FDDI network for a clients environment. Which of the following is TRUE with regards to an FDDI network?

    • A.

      An FDDI network cannot contain rings that are longer than 100 kilometers respectively.

    • B.

      An FDDI network can contain rings that exceed 100 kilometers respectively.

    • C.

      Each ring in an FDDI network can support a maximum of 500 nodes.

    • D.

      Each ring in an FDDI network can support a maximum of 50 nodes.

    Correct Answer
    A. An FDDI network cannot contain rings that are longer than 100 kilometers respectively.
    Explanation
    An FDDI network cannot contain rings that are longer than 100 kilometers respectively because FDDI (Fiber Distributed Data Interface) is a standard for transmitting data on optical fiber cables and it has a maximum ring length limitation. This limitation is due to the attenuation of the signal over long distances, which can lead to degradation of the signal quality. Therefore, to ensure reliable communication, FDDI networks have a maximum ring length of 100 kilometers.

    Rate this question:

  • 7. 

    You are in the procedure of designing a home network for a client. You have decided to make use of 10BaseT cabling. Which of the following options are TRUE with regards to 10 BaseT cabling?

    • A.

      10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length.

    • B.

      10BaseT cables are made up of twisted pair cables that are a maximum of 10 meters in length.

    • C.

      10BaseT cables allow for the system to operate at 10Mbps.

    • D.

      10BaseT cables allow for the system to operate at 100 Mbps.

    Correct Answer
    A. 10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length.
    Explanation
    10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length. This means that the cables used in a 10BaseT network can reach a maximum distance of 100 meters from the device to the network switch or hub. This length limitation is important to consider when designing the network layout and ensuring that all devices can be connected within the specified distance.

    Rate this question:

  • 8. 

    A client has a small office network. The customer would like to create a virtual LAN on their network. Which of the following components should the customer have to proceed?

    • A.

      The customer should have a switch.

    • B.

      The customer should have a modem.

    • C.

      The customer should have a server.

    • D.

      The customer should have a switch.

    Correct Answer
    A. The customer should have a switch.
    Explanation
    To create a virtual LAN (VLAN), the customer would need a switch. A switch is a networking device that allows multiple devices to connect and communicate with each other within a local network. It can be used to create VLANs by grouping certain ports together and isolating them from other ports. This allows for better network management, security, and traffic control. A modem is used to connect to the internet, while a server is used to store and manage data or provide services. However, for creating a VLAN specifically, a switch is the necessary component.

    Rate this question:

  • 9. 

    You have executed the NBTSTAT command with the -S parameter from the command-line on your workstation. Which of the following describes the reason for executing this command?

    • A.

      For the purpose of viewing the names registered locally by NetBIOS applications.

    • B.

      For the purpose of viewing the current NetBIOS sessions and their status, with the IP address.

    • C.

      For the purpose of purging the name cache.

    • D.

      For the purpose of viewing the NetBIOS sessions table converting destination IP addresses to computer NetBIOS names.

    Correct Answer
    B. For the purpose of viewing the current NetBIOS sessions and their status, with the IP address.
    Explanation
    The NBTSTAT command with the -S parameter is used to view the current NetBIOS sessions and their status, along with the associated IP addresses. This command provides information about the active NetBIOS sessions on the workstation, allowing the user to monitor and troubleshoot network connections. It does not involve purging the name cache or converting destination IP addresses to computer NetBIOS names.

    Rate this question:

  • 10. 

    Users have reported that they are experiencing network connectivity problems.  You decide to run the ping -I command from the command-line. Which of the following describes the purpose of using the ping -I command?

    • A.

      It allows you to specify a Time To Live for outgoing packets.

    • B.

      It allows you to specify the type of service.

    • C.

      It allows you to specify the amount of data to include int he ping.

    • D.

      It allows you to resolve addresses to host names.

    Correct Answer
    C. It allows you to specify the amount of data to include int he ping.
    Explanation
    The purpose of using the ping -I command is to specify the amount of data to include in the ping. This command allows the user to determine the size of the packets being sent during the ping test. By specifying the amount of data, the user can assess the network connectivity and measure the response time based on the size of the packets being transmitted.

    Rate this question:

  • 11. 

    A client would like to connect his two home computers, You need to solve the problem without the use of unnecessary hardware. Which of the following actions should you take?

    • A.

      You should make use of a hub and a UTP crossover cable with RJ-45 connectors.

    • B.

      You should make use of a hub and a UTP crossover cable with RJ-11 connectors.

    • C.

      You should make use of a UTP crossover cable with RJ-45 connectors.

    • D.

      You should make use of a UTP crossover cable with RJ-11 connectors.

    Correct Answer
    C. You should make use of a UTP crossover cable with RJ-45 connectors.
    Explanation
    To connect the two home computers without unnecessary hardware, the best solution is to use a UTP crossover cable with RJ-45 connectors. A UTP crossover cable is specifically designed to connect two devices directly without the need for a hub or switch. The RJ-45 connectors are commonly used for Ethernet connections, ensuring compatibility with the computers' network ports. This setup allows for a direct and efficient connection between the two computers, enabling file sharing, printer sharing, and other network activities.

    Rate this question:

  • 12. 

    A client has requested the installation of a T3 internet connection for their offices. Which of the following is TRUE with regards to T3 internet connections?

    • A.

      T3 internet connections have a minimum transmission rate of 64 Mbps.

    • B.

      T3 internet connections have a minimum transmission rate of 56 Kbps.

    • C.

      T3 internet connections have a minimum transmission rate of 10 Mbps.

    • D.

      T3 internet connections have a minimum transmission rate of 128 Mbps.

    Correct Answer
    C. T3 internet connections have a minimum transmission rate of 10 Mbps.
  • 13. 

    The client's network consists of a single domain named ABC.com. The client's network connects to the internet via an ISDN connection. Which of the following is TRUE with regards to the ISDN connection?

    • A.

      ISDN operates at a minimum speed of 128 Kbps.

    • B.

      ISDN operates at a maximum speed of 128 Mbps.

    • C.

      ISDN operates at a maximum speed of 128 Kbps.

    • D.

      ISDN operates at a minimum speed of 128 Mbps.

    Correct Answer
    C. ISDN operates at a maximum speed of 128 Kbps.
    Explanation
    ISDN operates at a maximum speed of 128 Kbps. ISDN stands for Integrated Services Digital Network and is a type of digital communication network that allows for the transmission of voice, video, and data over traditional phone lines. The maximum speed of ISDN is 128 Kbps, which is significantly slower than the maximum speed of 128 Mbps mentioned in the other options. Therefore, the correct answer is that ISDN operates at a maximum speed of 128 Kbps.

    Rate this question:

  • 14. 

    You have been tasked with resolving an Internet name resolution problem. After pinging the DNS server address of the client's ISP, you find that the ISP server is down. You then decide to run the ping-t command from the command line. Which of the following describes the purpose of this command?

    • A.

      It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted.

    • B.

      It performs reverse name resolution on the ISP's DNS server IP address.

    • C.

      It sends Echo Request messages with the Don't Fragment flag in the IP header set to 1.

    • D.

      It sends Echo Request messages a specified amount of times.

    Correct Answer
    A. It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted.
    Explanation
    The purpose of the "ping -t" command is to continuously send Echo Request messages to the ISP server until it is interrupted. This is useful in troubleshooting internet name resolution problems as it allows the user to monitor the connection and determine if the server is responding or if there is a connectivity issue.

    Rate this question:

  • 15. 

    You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open systems interconnect (OSI) model. You are explaining the Data-link layer. Which of the following best describes the Data-link layer of the OSI model?

    • A.

      The Data-link layer deals with the transmission and reception of the unstructured raw bit stream over a physical medium.

    • B.

      The Data-link layer controls the operation of the subnet.

    • C.

      The Data-link layer deals with the error-free transfer of data frames from one node to another over the physical layer.

    • D.

      The Data-link layer makes sure that messages are conveyed error-free, sequentially, and with no losses or duplications.

    Correct Answer
    C. The Data-link layer deals with the error-free transfer of data frames from one node to another over the physical layer.
    Explanation
    The Data-link layer of the OSI model is responsible for the error-free transfer of data frames from one node to another over the physical layer. This layer ensures that the data is transmitted without any errors, losses, or duplications. It also handles the framing and synchronization of data frames and manages flow control between the sender and receiver. By providing a reliable and efficient communication link between nodes, the Data-link layer plays a crucial role in the overall functioning of the network.

    Rate this question:

  • 16. 

    You have been instructed to design a TCP/Ip-based network. you need to configure the use of a suitable name resolution strategy that makes provision for Windows and Unix computer on the network. Which of the following actions should you take?

    • A.

      You should make use of DNS as the name resolution strategy.

    • B.

      You should make use of NetBIOS as the name resolution strategy.

    • C.

      You should make use of DHCP as the name resolution strategy.

    • D.

      You should make use of Peer Name Resolution Protocol as the name resolution strategy.

    Correct Answer
    A. You should make use of DNS as the name resolution strategy.
    Explanation
    In order to configure a TCP/IP-based network that supports both Windows and Unix computers, it is recommended to use DNS (Domain Name System) as the name resolution strategy. DNS is a widely used protocol that translates domain names into IP addresses, allowing computers to locate and communicate with each other over the network. It is compatible with both Windows and Unix systems, making it the suitable choice for this scenario. NetBIOS is an older protocol primarily used in Windows environments, DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses, and Peer Name Resolution Protocol is not a commonly used name resolution strategy.

    Rate this question:

  • 17. 

    A client is planning to replace their existing network cabling. They have requested that the replacement cabling meet the following requirements: It must be unaffected by electromagnetic interference. It must be able to transmit data over vast distances. Which of the following actions should you take?

    • A.

      You should make use of Coaxial cable.

    • B.

      You should make use of a fiber-optic cable.

    • C.

      You should make use of Shielded Twisted-Pair cable.

    • D.

      You should make use of Unshielded Twisted-Pair cable.

    Correct Answer
    B. You should make use of a fiber-optic cable.
    Explanation
    A fiber-optic cable is the most suitable option for meeting the client's requirements. Fiber-optic cables are unaffected by electromagnetic interference, making them ideal for environments where there may be a lot of electrical interference. Additionally, fiber-optic cables can transmit data over vast distances without significant loss of signal quality, making them suitable for long-distance communication.

    Rate this question:

  • 18. 

    A client has configured their network to support both IPv4 and IPv6. You are explaining the differences between IPv4 and IPv6 to a class of the client's trained technicians. Which of the following statements are TRUE with regards to these differences?

    • A.

      IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format.

    • B.

      IPv4 addresses are represented in a colon-hexadecimal format, while IPv6 addresses are represented in a dotted-decimal format.

    • C.

      IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability.

    • D.

      IPv4 addresses make use of the first 32 bits of IPv6 addresses for interoperability.

    Correct Answer
    C. IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability.
  • 19. 

    You are designing a network that will have two subnets, named Subnet A and Subnet B, connected to a router. To save cost, ABC.com wants you to make use of an existing router that cannot be configured to support BOOTP. Subnet A will host a DHCP server, while Subnet B will have a DHCP relay agent configured. Which of the following is TRUE with regards to DHCP Relay Agent? (Choose Two)

    • A.

      It is used to prevent broadcast traffic across the two subnets.

    • B.

      It is used to pass broadcast traffic across the two subnets.

    • C.

      It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, whether it is configured on the VPN server or not.

    • D.

      It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected if it is configured on the VPN server.

    Correct Answer
    B. It is used to pass broadcast traffic across the two subnets.
    Explanation
    A DHCP relay agent is used to pass broadcast traffic across the two subnets. This means that when a client on Subnet B sends a DHCP broadcast message to obtain an IP address, the relay agent will receive the broadcast and forward it to the DHCP server on Subnet A. The DHCP server will then respond with an IP address and the relay agent will forward the response back to the client on Subnet B. This allows the client on Subnet B to obtain an IP address from the DHCP server on Subnet A without the need for a separate DHCP server on Subnet B.

    Rate this question:

  • 20. 

    You are in the process of connecting a 100BASE-SX Gigabit Ethernet in a clients office block. Which of the following statements are TRUE with regards to 1000BASE-SX?

    • A.

      It requires multi-mode fiber optic cable.

    • B.

      It requires single-mode fiber optic cable.

    • C.

      It can work over distances in excess of 70 Km.

    • D.

      The maximum length of a cable segment is 10 Km.

    Correct Answer
    A. It requires multi-mode fiber optic cable.
    Explanation
    1000BASE-SX Gigabit Ethernet requires multi-mode fiber optic cable. This type of cable is designed to carry multiple light signals simultaneously, allowing for higher data transmission rates over short distances. Single-mode fiber optic cable is not suitable for 1000BASE-SX as it is designed for longer distance transmissions. Additionally, 1000BASE-SX has a maximum cable segment length of 550 meters, which is significantly shorter than the mentioned 10 Km. Therefore, the only true statement is that it requires multi-mode fiber optic cable.

    Rate this question:

  • 21. 

    You are in the process of designing a Ring network for a client. Which of the following is an advantage of a Ring network?

    • A.

      A Ring network manages the connectivity between workstations without the need of a central node.

    • B.

      When you connect or remove devices on the Ring network, there are no interruptions.

    • C.

      A Ring network prevents the passing of data packets through an excessive number of nodes.

    • D.

      The number of nodes in a Ring network has no impact on communication delays.

    Correct Answer
    A. A Ring network manages the connectivity between workstations without the need of a central node.
    Explanation
    A Ring network manages the connectivity between workstations without the need of a central node. This means that each workstation in the network can communicate directly with its neighboring workstations, eliminating the need for a central hub or server. This decentralized structure allows for efficient and reliable communication as there is no single point of failure. Additionally, this design allows for easy scalability as new workstations can be added to the network without disrupting the existing connections.

    Rate this question:

  • 22. 

    You are in the process of designing a Star network for a client. Which of the following is an advantage of a Star network?

    • A.

      A star network manages the connectivity between workstations without the need of a central node.

    • B.

      When you connect or remove devices on the Star network, there are no interruptions.

    • C.

      A Star network allows the passing of data packets through an excessive number of nodes.

    • D.

      Failure of the central hub has no impact on a Star network.

    Correct Answer
    B. When you connect or remove devices on the Star network, there are no interruptions.
    Explanation
    The advantage of a Star network is that there are no interruptions when connecting or removing devices. In a Star network, each device is connected directly to a central hub, which allows for easy addition or removal of devices without affecting the rest of the network. This flexibility and scalability make the Star network a convenient choice for managing connectivity between workstations.

    Rate this question:

  • 23. 

    You are explaining the purpose of a dual stack node on the network. Whic of the following suitably represents this explaination?

    • A.

      It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model.

    • B.

      It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the physical layer of the OSI model.

    • C.

      It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the data-link layer of the OSI model.

    • D.

      It allows an IPv6 socket to communicate with an IPv4, and IPv6 peers at the session layer of the OSI model.

    Correct Answer
    A. It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model.
    Explanation
    A dual stack node on the network allows an IPv6 socket to communicate with both IPv4 and IPv6 peers at the transport layer of the OSI model. This means that the node can handle both IPv4 and IPv6 protocols, allowing seamless communication between different IP versions at the transport layer.

    Rate this question:

  • 24. 

    You have recently designed a network for a client, using the fully connected mesh topology. Which of the following is TRUE with regards to this kind of topology?

    • A.

      It's the connectivity between workstations without the need of a central node.

    • B.

      It does not require the use of switching or broadcasting.

    • C.

      It prevents the number of data packets through an excessive number of nodes.

    • D.

      The number of nodes in a fully connected mesh network has no impact on communication delays.

    Correct Answer
    B. It does not require the use of switching or broadcasting.
    Explanation
    A fully connected mesh topology does not require the use of switching or broadcasting. In this type of network, each workstation is directly connected to every other workstation, creating multiple paths for data to travel. This eliminates the need for a central node to manage the network traffic and allows for direct communication between workstations without the use of switching or broadcasting techniques.

    Rate this question:

  • 25. 

    You are responsible for running training exercises for trainee administrators. You are currently covering the layers of the Open Systems Interconnect model. You are explaining the Transport layer. Which of the following best describes the Transport layer of the OSI model?

    • A.

      The Transport layer deals with the transmission and reception of the unstructured raw bit stream over a physical medium.

    • B.

      The Transport layer controls the operation of the subnet.

    • C.

      The Transport layer deals with error-free transfer of data frames from one node to another over the physical layer.

    • D.

      The Transport layer makes sure that messages are conveyed error-free, sequentially, and with no losses or duplications.

    Correct Answer
    D. The Transport layer makes sure that messages are conveyed error-free, sequentially, and with no losses or duplications.
    Explanation
    The Transport layer of the OSI model is responsible for ensuring that messages are transmitted without errors, in the correct order, and without any losses or duplications. This layer is responsible for end-to-end communication between the source and destination nodes. It takes data from the Session layer and breaks it into smaller units called segments, which are then transmitted over the network. The Transport layer also handles flow control and error recovery to ensure reliable delivery of data.

    Rate this question:

  • 26. 

    A client has requested the configuration of a new internet connection. The client would like her connection to support high-definition television, as well as voice over IP and general Internet access, over a single connection. Which of the following options should you use?

    • A.

      ADSL

    • B.

      IDSL

    • C.

      HDSL

    • D.

      VDSL

    Correct Answer
    D. VDSL
    Explanation
    VDSL (Very high bit-rate Digital Subscriber Line) should be used to configure the new internet connection for the client. VDSL offers high-speed internet access and is capable of supporting high-definition television, voice over IP, and general internet access over a single connection. ADSL (Asymmetric Digital Subscriber Line), IDSL (ISDN Digital Subscriber Line), and HDSL (High-bit-rate Digital Subscriber Line) may not provide the required bandwidth or capabilities for the client's specific needs.

    Rate this question:

  • 27. 

    You are in the process of expanding a client's current LAN setup. You have been instructed to make sure that the cable used is fire safe, and that it emits less toxic fumes. Which of the following options should you use?

    • A.

      PVC cable.

    • B.

      Plenum rated cable.

    • C.

      Fiber-optic cable.

    • D.

      Carpet Cable.

    Correct Answer(s)
    B. Plenum rated cable.
    C. Fiber-optic cable.
    Explanation
    Plenum rated cable and fiber-optic cable are the correct options to use in this scenario. Plenum rated cable is specifically designed for use in plenum spaces, which are areas in a building used for air circulation. These cables have a special coating that is fire resistant and emits less toxic fumes in case of a fire. Fiber-optic cable, on the other hand, is made of glass or plastic fibers and does not conduct electricity, making it inherently safe from fire hazards. Both options ensure the safety of the LAN setup by minimizing the risk of fire and toxic fumes.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.