Network + Prep Quiz - IP Routing/Addressing

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Spaz072184
S
Spaz072184
Community Contributor
Quizzes Created: 1 | Total Attempts: 634
| Attempts: 634
SettingsSettings
Please wait...
  • 1/70 Questions

     Which of the following IPv4 addresses is the loopback address?

    • 0.0.0.0
    • 255.255.255.255
    • 127.0.0.1
    • 10.0.0.1
Please wait...
Network Plus Quizzes & Trivia
About This Quiz

This Network + Prep Quiz focuses on IP Routing and Addressing, assessing knowledge on the creators of IP, IPv4 and IPv6 address sizes, the OSI layer for IP, and related protocols. It's designed for learners preparing for network certifications, enhancing understanding of fundamental networking concepts.


Quiz Preview

  • 2. 

    The default network mask for Class C IP addresses is -

    • 255.0.0.0

    • 255.255.0.0

    • 255.255.255.0

    • 255.255.255.255

    Correct Answer
    A. 255.255.255.0
    Explanation
    The default network mask for Class A networks is 255.0.0.0, for Class B networks 255.255.0.0, for Class C networks 255.255.255.0

    Rate this question:

  • 3. 

    What is the size of the next-generation (IPv6) IP address?

    • 4 bytes (32 bits)

    • 15 bytes (120 bits)

    • 16 bytes (128 bits)

    • 12 bytes (96 bits)

    Correct Answer
    A. 16 bytes (128 bits)
    Explanation
    An IPv6 address contains 16 bytes (128 bits). IPv6 addresses are written in a hexadecimal format. The eight, two-byte segments of the address are separated by colons (:). For example - E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420

    Rate this question:

  • 4. 

    What are the smallest and largest possible values for an IP octet?

    • 0 and 255

    • 0 and 512

    • 0 and 256

    • 0 and 999

    Correct Answer
    A. 0 and 255
    Explanation
    Each octet of an IP address ranges in value from 0 to 255. Although not all octets are byte-long quantities, IP octets are always 8 bits in length, and each bit can be set to either 0 or 1.

    Rate this question:

  • 5. 

    Which of these shell commands supplies the IP address of a computer running the Windows operating system?

    • Ipshow

    • Iplookup

    • Ipconfig (or winipcfg)

    • Traceroute

    Correct Answer
    A. Ipconfig (or winipcfg)
    Explanation
    The ipconfig command displays the IP address, network mask, and gateway address for each adapter. It can also be used to release and renew address settings, such as those made through DHCP.

    Rate this question:

  • 6. 

    Each of the four numeric fields of an IP address written in dotted-decimal notation is also known as -

    • Subnet

    • Word

    • Octet

    • Class

    Correct Answer
    A. Octet
    Explanation
    Each of the four bytes of an IP address is also known as an octet.

    Rate this question:

  • 7. 

    What is the size of today's standard (IPv4) IP address?

    • 4 bytes (32 bits)

    • 16 bytes (128 bits)

    • 12 bytes (96 bits)

    • 15 bytes (120 bits)

    Correct Answer
    A. 4 bytes (32 bits)
    Explanation
    An IPv4 address contains 4 bytes (32 bits). IP addresses are usually written in dotted-decimal notation where a period (.) separates each byte (for example, 10.0.0.255). With 32 bits, a total of 4,294,967,296 IPv4 addresses are possible.

    Rate this question:

  • 8. 

    What Open Systems Interconnection (OSI) layer does IP belong to?

    • Network

    • Transport

    • Session

    • data link

    Correct Answer
    A. Network
    Explanation
    IP belongs to the network layer of the OSI model.

    Rate this question:

  • 9. 

    Which utility program is designed to report whether a networked computer is responding at a given IP address, and how long these responses take?

    • Traceroute

    • Ttcp

    • Ping

    • Netstat

    Correct Answer
    A. Ping
    Explanation
    The ping utility sends network packets using a special protocol to determine the responsiveness of remote addresses.

    Rate this question:

  • 10. 

    A traditional Class C network can handle a maximum of how many hosts?

    • 254

    • 258

    • 510

    • 512

    Correct Answer
    A. 254
    Explanation
    Using the default network mask 255.255.255.0, eight bits remain for host addressing. A total of 256 possible addresses can fit within the lower eight bits. However, traditional IP prohibits a host being assigned the all-zeros (.0) and all-ones (.255) host address, so network administrators configure no more than 254 hosts on a typical Class C network.

    Rate this question:

  • 11. 

    Which of the following higher-level protocols runs over IP?

    • FTP

    • HTTP

    • SMTP

    • D) All of the above

    Correct Answer
    A. D) All of the above
    Explanation
    File Transfer (FTP), Hypertext Transfer Protocol (HTTP), Simple Mail Transport Protocol (SMTP), and many other popular protocols run at higher levels of the OSI model, utilizing IP as their foundation.

    Rate this question:

  • 12. 

    What mechanism does ARP use to resolve IP addresses?

    • Mathematical formula

    • Central Web site

    • Lookup table

    • Random number generator

    Correct Answer
    A. Lookup table
    Explanation
    The ARP cache of IP address to MAC address mappings functions as a lookup table.

    Rate this question:

  • 13. 

    Which of the following IP address ranges are considered part of the Class B network?

    • 128.0.0.0 - 159.255.255.255

    • 128.0.0.0 - 191.255.255.255

    • 128.0.0.0 - 175.255.255.255

    • 128.0.0.0 - 207.255.255.255

    Correct Answer
    A. 128.0.0.0 - 191.255.255.255
    Explanation
    In a Class B network, the first three bits of the first octet are set to '110'. Therefore, the Class B range includes 128.0.0.0 through 191.255.255.255.

    Rate this question:

  • 14. 

    As the Nerwork administrator, you decide to blcok port 80. Which of the following services will be unavailable for network users?

    • DNS

    • POP3

    • FTP

    • HTTP

    Correct Answer
    A. HTTP
    Explanation
    If the network administrator decides to block port 80, the service that will be unavailable for network users is HTTP. Port 80 is specifically used for HTTP (Hypertext Transfer Protocol) which is the protocol used for transmitting web pages and other web content. Blocking this port means that users will not be able to access websites or any web-based services that rely on HTTP for communication.

    Rate this question:

  • 15. 

    Which of the following IP address ranges are considered part of the Class C network?

    • 192.0.0.0 - 223.255.255.255

    • 192.0.0.0 - 215.255.255.255

    • 192.0.0.0 - 219.255.255.255

    • 192.0.0.0 - 211.255.255.255

    Correct Answer
    A. 192.0.0.0 - 223.255.255.255
    Explanation
    The Class C network range includes 192.0.0.0 through 223.255.255.255. This is the range of addresses most commonly used on the Internet today.

    Rate this question:

  • 16. 

    CIDR stands for -

    • Class-Based Internet Domain Routing

    • Careful Inter-Domain Routing

    • Constant Internet Domain Routing

    • Classless Inter-Domain Routing

    Correct Answer
    A. Classless Inter-Domain Routing
    Explanation
    CIDR stands for Classless Inter-Domain Routing. CIDR was developed in the 1990s as a standard scheme for routing IP addresses.

    Rate this question:

  • 17. 

    You ask your ISP to assign a public IP address for the External interface of your Windows 2000 server, which is running a proxy server application. In the emal message you get that contains the information, the ISP tells you that you have been assigned the IP 203.15.226.12/24. When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use?

    • 255.255.255.255

    • 255.255.255.0

    • 255.255.240.0

    • 255.255.255.240

    Correct Answer
    A. 255.255.255.0
    Explanation
    The correct subnet mask to use in this scenario is 255.255.255.0. This is because the IP address 203.15.226.12/24 indicates that the first 24 bits of the IP address are the network portion, and the remaining 8 bits are the host portion. A subnet mask of 255.255.255.0 represents 24 bits set to 1, indicating that the first 24 bits are the network portion and the last 8 bits are available for host addresses.

    Rate this question:

  • 18. 

    What is the difference between static and dynamic routing?

    • You use static routing in large, scalable networks

    • Dynamic routing is used by a DNS server

    • Dynamic routes are added automatically

    • Static routes are added automatically

    Correct Answer
    A. Dynamic routes are added automatically
    Explanation
    Dynamic routing protocols, like RIP, EIGRP and OSPF automatically add route updates
    to the routing table. Static routes must be added by hand.

    Rate this question:

  • 19. 

    Which of these shell commands supplies the IP address of a computer running the Linux operating system?

    • Ipconfig

    • Linuxconf

    • Ifconfig

    • None of the above

    Correct Answer
    A. Ifconfig
    Explanation
    The ifconfig command can be used to display and change IP settings for all network adapters on a Linux system.

    Rate this question:

  • 20. 

    You have been tasked with temporarily disabling telnet access for external users. What is the best way to accomplish this?

    • Block port 53 on the corporate firewall

    • Block port 23 on the corporate firewall

    • Unistall the telnet service

    • Configure ICS to ignore the client-initiated telnet requests

    Correct Answer
    A. Block port 23 on the corporate firewall
    Explanation
    Blocking port 23 on the corporate firewall is the best way to temporarily disable telnet access for external users. Telnet typically uses port 23 for communication, so by blocking this port, external users will not be able to establish telnet connections to the network. This effectively prevents external access to telnet services without completely uninstalling the telnet service or affecting other network services.

    Rate this question:

  • 21. 

    Which of the following describes routing convergence?

    • The time it takes for your VPN to connect

    • The time required by protocols to update their forwarding tables after changes have occurred

    • The time required for IDS to detect an attack

    • The time required by switches to update their link status and go into forwarding state

    Correct Answer
    A. The time required by protocols to update their forwarding tables after changes have occurred
    Explanation
    Convergence time happens in many protocols, for many devices, by routing convergence
    is the time for all routers to update their routing tables (forwarding tables).

    Rate this question:

  • 22. 

    Which of the following IP address ranges are reserved for use on private networks?

    • 10.0.0.0 - 10.255.255.255

    • 172.16.0.0 - 172.31.255.255

    • 192.168.0.0 - 192.168.255.255

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    10.0.0.0 - 10.255.255.255 is the private network range within Class A, 172.16.0.0 - 172.31.255.255 in Class B, and 192.168.0.0 - 192.168.255.255 in Class C.

    Rate this question:

  • 23. 

    Which of the following best describes the function of the default gateway?

    • It provides the route for destinations outside the local network.

    • It enables a single Internat connection to be used by several users

    • It identifies the local subnet and formulates a routing table

    • It is used to communicate in a multiple-platform environment

    Correct Answer
    A. It provides the route for destinations outside the local network.
    Explanation
    The default gateway is responsible for routing network traffic between different networks. It acts as an intermediary device that connects the local network to other networks, such as the internet. When a device on the local network wants to communicate with a destination outside of its own network, it sends the traffic to the default gateway. The default gateway then determines the appropriate route for the traffic to reach its destination outside the local network. Therefore, the statement "It provides the route for destinations outside the local network" best describes the function of the default gateway.

    Rate this question:

  • 24. 

    Which of the following is a Class B address?

    • 129.16.12.200

    • 126.15.16.122

    • 211.244.212.5

    • 193.17.101.27

    Correct Answer
    A. 129.16.12.200
    Explanation
    The given IP address 129.16.12.200 is a Class B address. In Class B, the first two octets represent the network portion of the address, while the remaining two octets represent the host portion. In this case, the first octet is 129, which falls within the range of 128 to 191, indicating a Class B address. Therefore, the given IP address is a Class B address.

    Rate this question:

  • 25. 

    Why would you want to use a dynamic routing protocol instead of using static routes?

    • Less overhead on the router

    • Dynamic routing is more secure

    • Dynamic routing scales to larger networks

    • The network runs faster

    Correct Answer
    A. Dynamic routing scales to larger networks
    Explanation
    Dynamic routing is typically used in today’s networks because it scales to larger networks
    and takes less administrative work.

    Rate this question:

  • 26. 

    Which routing protocol has a maximum hop count of 15?

    • RIPv1

    • IGRP

    • EIGRP

    • OSPF

    Correct Answer
    A. RIPv1
    Explanation
    The distance-vector protocols RIPv1 and RIPv2 both have a maximum hop count of
    15 (remember, 16 is unreachable). IGRP and EIGRP have a hop count of 255, and OSPF
    doesn’t have a maximum hop count.

    Rate this question:

  • 27. 

    The Class D network range is reserved on the Internet for?

    • Broadcast

    • Anycast

    • Multicast

    • None of the above

    Correct Answer
    A. Multicast
    Explanation
    The Class D address range, from 224.0.0.0 through 239.255.255.255, is reserved on the Internet for multicast. Multicast is the ability to define an arbitrary group of IP nodes and address messages just to that collective rather than broadcast to all nodes on the network or send point-to-point to each node individually.
    The Class E address range, from 240.0.0.0 through 255.255.255.255 is reserved on the Internet and not to be used for any purpose.

    Rate this question:

  • 28. 

    Which of the following are considered distance-vector routing protocols? (Choose two.)

    • OSPF

    • RIP

    • RIPv2

    • IS-IS

    Correct Answer(s)
    A. RIP
    A. RIPv2
    Explanation
    RIP and RIPv2 are distance-vector routing protocols. OSPF and IS-IS are link state.

    Rate this question:

  • 29. 

    Which central authority is responsible for allocating IP addresses on the Internet?

    • IETF

    • IEEE

    • IANA

    • None of the above

    Correct Answer
    A. IANA
    Explanation
    The Internet Assigned Numbers Authority (IANA) centrally coordinates the use of IPv4 address space on the Internet.

    Rate this question:

  • 30. 

    What function does Address Resolution Protocol (ARP) perform?

    • Converts IP addresses to Ethernet addresses

    • Prevents two computers from using the same IP address

    • Automatically assigns IP addresses to computers

    • None of the above

    Correct Answer
    A. Converts IP addresses to Ethernet addresses
    Explanation
    Address Resolution Protocol (ARP) converts IP addresses to Media Access Control (MAC) addresses. ARP is usually implemented in the operating system network device driver.

    Rate this question:

  • 31. 

    Which of the following uses only hop count as a metric to find the best path to a remote network?

    • RIP

    • EIGRP

    • OSPF

    • BGP

    Correct Answer
    A. RIP
    Explanation
    RIP and RIPv2 uses only hop count as a metric, with a maximum of 15 hops, to find the
    best path to a remote network.

    Rate this question:

  • 32. 

    RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so   more efficiently.  What type of transmission does RIPv2 use to accomplish this task?

    • Broadcasts

    • Multicasts

    • Telecast

    • None of the above

    Correct Answer
    A. Multicasts
    Explanation
    RIPv1 sends broadcasts every 30 seconds and has an AD of 120. RIPv2 sends multicasts
    (224.0.0.9) every 30 seconds and also has an AD of 120. RIPv2 sends subnet-mask information
    with the route updates, which allows it to support classless networks and discontiguous
    networks. RIPv2 also supports authentication between routers; RIPv1 does not.

    Rate this question:

  • 33. 

    Who invented IP and some related Internet protocols?

    • Vinton Cerf and Bob Metcalfe

    • Vinton Cerf and Robert Kahn

    • Bob Metcalfe and Ivan Sutherland

    Correct Answer
    A. Vinton Cerf and Robert Kahn
    Explanation
    In a research paper published in 1974, Vinton Cerf and Robert Kahn proposed a protocol they called "TCP". Cerf and Kahn didn't realize it at the time, but the protocol they invented would later become IP, the official network-layer protocol of the Internet.

    Rate this question:

  • 34. 

    You decide to move your network from NetBEUI to TCP/IP. For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the internal network, you choose to configure systems by using one of the private address ranges. Of the following address ranges, which one would you not consider?

    • 192.168.0.0 to 192.168.255.255

    • 131.16.0.0 to 131.16.255.255

    • 10.0.0.0 to 10.255.255.255

    • 172.16.0.0 to 172.31.255.255

    Correct Answer
    A. 131.16.0.0 to 131.16.255.255
    Explanation
    The address range 131.16.0.0 to 131.16.255.255 would not be considered for the internal network because it is not one of the private address ranges specified by the Internet Assigned Numbers Authority (IANA). The private address ranges are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. These address ranges are reserved for private networks and are not routable on the internet. Using the 131.16.0.0 range internally could result in conflicts or connectivity issues with external networks.

    Rate this question:

  • 35. 

    Which of the following IP addresses is not from a private address range?

    • 192.168.200.117

    • 172.16.3.204

    • 127.45.112.16

    • 10.27.100.143

    Correct Answer
    A. 127.45.112.16
    Explanation
    The IP address 127.45.112.16 is not from a private address range because it falls within the range of public IP addresses. Private IP addresses are reserved for use within private networks and are not routable over the internet. The address 127.45.112.16 is a valid public IP address that can be used to communicate over the internet.

    Rate this question:

  • 36. 

    Which of the following are considered link-state routing protocols? (Choose two.)

    • OSPF

    • RIP

    • RIPv2

    • IS-IS

    Correct Answer(s)
    A. OSPF
    A. IS-IS
    Explanation
    RIP and RIPv2 are distance-vector routing protocols. OSPF and IS-IS are link state.

    Rate this question:

  • 37. 

    Can IP run over any other physical networks besides Ethernet?

    • No (and IP does not run over Ethernet)

    • Yes (but IP does not run over Ethernet)

    • No

    • Yes

    Correct Answer
    A. Yes
    Explanation
    IP runs over Ethernet and several other hardware interfaces including ATM.

    Rate this question:

  • 38. 

    The maximum size of an IP datagram (including the header) is -

    • 1,024 bytes

    • 4,096 bytes

    • 1,500 bytes

    • 65,535 bytes

    Correct Answer
    A. 65,535 bytes
    Explanation
    The datagram length field in an IP header is 16 bits in length. Therefore, the maximum datagram size an IP datagram can support is 2^16 - 1 = 65,535 bytes

    Rate this question:

  • 39. 

    In IPv6, the anycast feature allows -

    • Senders to address packets to all nodes in a group

    • Receivers to listen for any given packet on the network

    • senders to address to packets to any member of a group of nodes

    • Receivers to announce their presence to potential senders

    Correct Answer
    A. senders to address to packets to any member of a group of nodes
    Explanation
    Anycast is a feature of Internet Protocol new in IPv6. Anycast allows senders to direct messages to a node group with the expectation that any single arbitrary node in the group can receive and act on the message. Anycast is similar to load balancing and other redundancy concepts implemented elsewhere in communications architectures. Anycast can be used to implement broadcasts, but anycast is a more generalized concept

    Rate this question:

  • 40. 

    What is the IPv6 equivalent of 127.0.0.1? (Choose two)

    • 0:0:0:0:0:0:0:1

    • 0:0:0:0:0:0:0:24

    • ::01

    • ::24

    Correct Answer(s)
    A. 0:0:0:0:0:0:0:1
    A. ::01
    Explanation
    The IPv6 equivalent of 127.0.0.1 is 0:0:0:0:0:0:0:1 and ::01. IPv6 addresses are represented as eight groups of four hexadecimal digits separated by colons. In this case, both 0:0:0:0:0:0:0:1 and ::01 represent the loopback address in IPv6, which is equivalent to 127.0.0.1 in IPv4.

    Rate this question:

  • 41. 

    Which of the following IPv6 addresses is the loopback address?

    • 0::0

    • 0::1

    • 127::0

    • All the above

    Correct Answer
    A. 0::1
    Explanation
    The IPv6 address 0:0:0:0:0:0:0:1, written in shorthand notation as 0::1, is the loopback address in IPv6, equivalent to 127.0.0.1 in the IPv4 scheme.

    Rate this question:

  • 42. 

    Computers configured with more than one IP address are often called

    • Routers

    • Bridges

    • Multi-homed

    • Internetworked

    Correct Answer
    A. Multi-homed
    Explanation
    A multi-homed device contains multiple network adapters. Multi-homed computers are often used as proxy servers, firewalls, and other types of gateways. A proxy server often has one adapter with an external Web address (assigned by an ISP) and another adapter to use a private intranet address (such as 192.168.0.1).
    Some Web servers like Apache support a feature called virtual hosting. Virtual hosting allows a computer to act as if it possesses multiple IP addresses. Virtual hosting is not the same as multi-homing, that refers to multiple network interfaces of a device.

    Rate this question:

  • 43. 

    What routing protocol is typically used to connect AS’s on the Internet?

    • IGRP

    • RIPv2

    • BGP

    • OSPF

    Correct Answer
    A. BGP
    Explanation
    BGP is the routing protocol used to connect autonomous systems together on the Internet
    for its ability to make classless routing and summarization possible. These capabilities help
    to keep routing tables smaller and more efficient at the ISP core.

    Rate this question:

  • 44. 

    What is the administrative distance of OSPF?

    • 90

    • 100

    • 110

    • 120

    Correct Answer
    A. 110
    Explanation
    The administrative distance (AD) is a very important parameter in a routing protocol.
    The lower the AD, the more trusted the route. If you have IGRP and OSPF running, by
    default IGRP routes would be placed in the routing table because IGRP has a lower AD of
    100. OSPF has an AD of 110. RIPv1 and RIPv2 both have an AD of 120, and EIGRP is the
    lowest, at 90.

    Rate this question:

  • 45. 

    Which routing protocols have an administrative distance of 120? (Choose two.)

    • RIPv1

    • RIPv2

    • EIGRP

    • OSPF

    Correct Answer(s)
    A. RIPv1
    A. RIPv2
    Explanation
    Both RIPv1 and RIPv2 have an AD of 120. EIGRP has an AD of 90.

    Rate this question:

  • 46. 

    The destination IP address for an IPv4 datagram is stored where in the header?

    • Bits

    • Bytes

    • Longwords

    • none of the above

    Correct Answer
    A. Longwords
    Explanation
    The length of an IP datagram header is technically measured in longwords. The header length field is 4 bits long and, along with the protocol version number, makes up the first byte of an IP header. In a normal 20-byte long IP header, the header length field therefore normally contains the value '5' (0x1001).

    Rate this question:

  • 47. 

    The datagram length field in an IPv4 datagram contains which numeric value?

    • Total number of bytes in the datagram, including the header

    • Total number of longwords in the datagram, including the header

    • Total number of bytes in the datagram, excluding the header

    • Total number of longwords in the datagram, excluding the header

    Correct Answer
    A. Total number of bytes in the datagram, including the header
    Explanation
    The length of an IP datagram itself is technically measured in bytes. The length field represents the size of both the header and the data portions of the datagram

    Rate this question:

  • 48. 

    In DNS, requests to obtain the IP address of a given host name are issued by -

    • Servers

    • Translators

    • Resolvers

    • None of the above

    Correct Answer
    A. Resolvers
    Explanation
    DNS resolvers issue host name/address conversion requests. Resolvers effectively work like clients, issuing requests to and within the hierarchy of DNS servers.

    Rate this question:

  • 49. 

    In CIDR notation, which of the following Class C networks contains host 192.168.14.2?

    • 192.168.10.0/22

    • 192.168.11.0/21

    • 192.168.12.0/23

    • 192.168.13.0/24

    Correct Answer
    A. 192.168.11.0/21
    Explanation
    CIDR notation uses the format xxx.xxx.xxx.xxx/n, where 'n' is the number of '1' bits in the network mask. This means the network 192.168.11.0/21 actually contains all addresses in the range 192.168.8.0 - 192.168.15.255. Conversely,
    • the network 192.168.10.0/22 only contains addresses in the range 192.168.8.0 - 192.168.11.255
    • the network 192.168.12.0/23 only contains addresses in the range 192.168.12.0 - 192.168.13.255, and
    • the network 192.168.13.0/24 only contains addresses in the range 192.168.13.0 - 192.168.13.255.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 25, 2010
    Quiz Created by
    Spaz072184
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.