Incd1 - Pre-assessment Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jgrobie
J
Jgrobie
Community Contributor
Quizzes Created: 1 | Total Attempts: 149
| Attempts: 149 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. Which command is used for actively testing a network connection between two hosts?

Explanation

The correct answer is "ping". Ping is a command used to test the connectivity between two hosts on a network. It sends a small packet of data to the destination host and waits for a response. If a response is received, it indicates that the network connection is active and functioning properly. Ping is commonly used to troubleshoot network issues and determine the latency or response time between hosts.

Submit
Please wait...
About This Quiz
Incd1 - Pre-assessment Quiz - Quiz

No specific score is required in order to be eligible to participate in ICND1. Rather, your responses will inform the trainer as to what areas to focus on... see moreduring class.
Important: As newcomers to networking, do NOT be discouraged if you get a low number of questions correct. see less

2. Once a computer has completed its boot sequence, the active/run-time configuration settings are where?

Explanation

After a computer completes its boot sequence, the active/run-time configuration settings are stored in RAM (Random Access Memory). RAM is a type of computer memory that allows data to be read from and written to quickly. It is volatile memory, meaning that its contents are lost when the computer is powered off. Storing the configuration settings in RAM allows for quick access and modification of these settings during the computer's operation.

Submit
3. A computer has the IP address 192.168.10.100/24. Match each of the following addresses.
Submit
4. In a small branch-office LAN, there is a switch, a router, and four host computers. Which devices will connect directly to the router? (Choose all that apply.)

Explanation

The switch will connect directly to the router. The switch is responsible for connecting all the devices within the LAN, including the host computers and the router. The host computers will then connect to the switch, which will in turn connect to the router. This allows the host computers to access the Internet through the router.

Submit
5. If you go to an https:// web site, what does the web server send your computer to validate its identity?

Explanation

When you go to an https:// website, the web server sends your computer a digital certificate to validate its identity. A digital certificate is a file that contains information about the website and its owner, including a public key. This certificate is issued by a trusted third-party organization called a Certificate Authority (CA), which verifies the authenticity of the website. Your computer uses this digital certificate to establish a secure connection with the website and ensure that your data is encrypted and transmitted securely.

Submit
6.
  1. A user starts their computer at the beginning of the day. After logging on to the network, the user immediately opens their web browser and accesses the company's website at https://www.myco.com. Which two types of servers were contacted by the user's computer after the browser was started if the user successfully connects to the web site? (Choose two answers.)

Explanation

After the user starts their computer and opens their web browser, the first server contacted would be the DNS (Domain Name System) server. This server is responsible for translating the human-readable URL (http://www.myco.com) into an IP address that the computer can understand. Once the IP address is obtained, the user's computer then contacts the web server. The web server stores and delivers the company's website content to the user's browser, allowing them to successfully connect to the website. Therefore, the two types of servers contacted by the user's computer in this scenario are the DNS server and the web server.

Submit
7. Which of these services will still work even if a packet is "dropped" during network communications? (Choose all that apply.)

Explanation

Streaming video and streaming audio services will still work even if a packet is "dropped" during network communications because these services use real-time protocols that can tolerate some packet loss without affecting the overall quality of the stream. In contrast, file transfers and sending email rely on reliable transmission protocols that require all packets to be successfully delivered for the transfer to be completed successfully. Therefore, if a packet is dropped during network communications for file transfers or sending email, the transfer may fail or be corrupted.

Submit
8. Listed below are the main steps in the boot sequence of a typical computer. Put the steps in the correct sequential order, earliest step first and final step last.
Submit
9. The configuration settings a computer will use when it boots up are usually stored where?

Explanation

The configuration settings a computer will use when it boots up are usually stored on disk. This is because the disk, typically a hard disk drive (HDD) or solid-state drive (SSD), is a non-volatile storage device that retains data even when the computer is powered off. The settings are saved on the disk in a specific file or files, such as the BIOS or UEFI settings, which are accessed during the boot process to initialize the computer's hardware and software components. Storing the settings on disk ensures that they are persistently available for future boot-ups.

Submit
10. The TCP/IP stack is installed on computers as part of the _____________.

Explanation

The TCP/IP stack is installed on computers as part of the operating system. The operating system provides the necessary software infrastructure for networking protocols and services, including TCP/IP, to function properly. It handles the communication between different network layers and manages the transmission and reception of data packets. Without the operating system, the TCP/IP stack would not be able to operate and facilitate network communication.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 01, 2015
    Quiz Created by
    Jgrobie
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which command is used for actively testing a network connection...
Once a computer has completed its boot sequence, the active/run-time...
A computer has the IP address 192.168.10.100/24. Match each of the...
In a small branch-office LAN, there is a switch, a router, and four...
If you go to an https:// web site, what does the web server send your...
A user starts their computer at the beginning of the day. After...
Which of these services will still work even if a packet is "dropped"...
Listed below are the main steps in the boot sequence of a typical...
The configuration settings a computer will use when it boots up are...
The TCP/IP stack is installed on computers as part of the...
Alert!

Advertisement