Intro To Networking Midterm Exam Prep

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Timlem
T
Timlem
Community Contributor
Quizzes Created: 1 | Total Attempts: 917
| Attempts: 917
SettingsSettings
Please wait...
  • 1/106 Questions

    The global Internet would be considered a _________?

    • LAN
    • WAN
    • SAN
    • PAN
    • CAN
    • MAN
Please wait...
Intro To Networking Midterm Exam Prep - Quiz
About This Quiz

This Intro to Networking Midterm Exam Prep quiz assesses key networking concepts, including DHCP configuration, cable selection for optimal transmission, and usage of network utilities like Netstat. It is designed to enhance practical understanding and application of networking principles, ideal for students or professionals in IT fields.


Quiz Preview

  • 2. 

    The ISO defined the OSI model to create a standardized approach to network communications and break up the process into clearly defined steps. The layered approach allowed for modular engineering and multi-vendor interoperability. How many layers were defined in the OSI model?

    • 1

    • 4

    • 6

    • 7

    • 10

    Correct Answer
    A. 7
    Explanation
    The OSI model defined seven layers in order to create a standardized approach to network communications. This layered approach allowed for modular engineering and multi-vendor interoperability. Each layer has its own specific function and interacts with the layers above and below it in a hierarchical manner. By breaking up the process into clearly defined steps, the OSI model provides a framework for understanding and troubleshooting network communication.

    Rate this question:

  • 3. 

    A ___________________ is a temporary storage location in memory used by many protocols to help reduce unnecessary network traffic and speed up processing and overall network communications.

    • FIFO queue

    • Cache

    • Register

    • Simm

    Correct Answer
    A. Cache
    Explanation
    A cache is a temporary storage location in memory used by many protocols to help reduce unnecessary network traffic and speed up processing and overall network communications. It stores frequently accessed data closer to the processor, allowing for faster retrieval and reducing the need to fetch data from the main memory or external storage. This helps in improving the overall performance of the system by reducing latency and increasing data access speed.

    Rate this question:

  • 4. 

    The application, presentation and session layers can be grouped together and referred to as the _____________ layers.

    • Transport

    • Network

    • Upper

    • Lower

    Correct Answer
    A. Upper
    Explanation
    The application, presentation, and session layers can be grouped together and referred to as the upper layers. These layers are responsible for managing the communication between the end-user and the network. They handle tasks such as data formatting, encryption, session management, and application-specific protocols. By grouping these layers together as the upper layers, it distinguishes them from the lower layers, which are responsible for more basic functions such as routing and physical transmission of data.

    Rate this question:

  • 5. 

    Using a 3-way handshake to establish a connection-oriented session ____________ is the protocol used to guarantee delivery of segments at the transport layer.

    • Tcp

    • Udp

    • Ip

    • Sip

    Correct Answer
    A. Tcp
    Explanation
    Using a 3-way handshake to establish a connection-oriented session is a characteristic of the TCP (Transmission Control Protocol). TCP ensures the reliable delivery of segments at the transport layer by using sequence numbers, acknowledgments, and retransmissions. This protocol guarantees that data sent from one device to another will be received accurately and in the correct order. UDP (User Datagram Protocol) is a connectionless protocol that does not provide the same level of reliability as TCP. IP (Internet Protocol) is responsible for routing packets across networks, while SIP (Session Initiation Protocol) is used for establishing and terminating multimedia sessions.

    Rate this question:

  • 6. 

    UDP does not guarantee delivery of segments in any form and is therefore known as a ________________________ protocol.

    • Internet

    • Control

    • Host to host

    • Connectionless

    Correct Answer
    A. Connectionless
    Explanation
    UDP (User Datagram Protocol) does not guarantee the delivery of segments, meaning that it does not ensure that the data sent from one host will reach the destination host. This lack of guarantee makes UDP a connectionless protocol, as it does not establish a formal connection between the sender and receiver. Unlike TCP (Transmission Control Protocol), which provides reliability through acknowledgments and retransmissions, UDP is used when speed and efficiency are more important than data integrity. Therefore, the correct answer is "connectionless."

    Rate this question:

  • 7. 

    How many bits is an IPv4 address?

    • 8

    • 32

    • 64

    • 128

    Correct Answer
    A. 32
    Explanation
    An IPv4 address is composed of 32 bits. This means that it is represented by a sequence of 32 binary digits (0s and 1s). Each bit in the address can have two possible values, 0 or 1, giving a total of 2^32 (or approximately 4.3 billion) unique addresses. This is the reason why IPv4 addresses are often referred to as 32-bit addresses.

    Rate this question:

  • 8. 

    The wireless standards used for WLANs are known as ________________.

    • 802.11

    • 4G LTE

    • Bluetooth

    • Infrared

    Correct Answer
    A. 802.11
    Explanation
    The correct answer is 802.11 because it refers to the set of wireless networking standards used for WLANs (Wireless Local Area Networks). These standards define the protocols and technologies that enable wireless communication between devices within a limited area. 802.11 is widely used for wireless internet access in homes, offices, and public spaces, providing reliable and fast connectivity.

    Rate this question:

  • 9. 

    Providing both logical addressing and routing functions the _______________ layer is most associated with the IP protocol and routing hardware.

    • Transport

    • Network

    • Upper

    • Lower

    Correct Answer
    A. Network
    Explanation
    The network layer is the correct answer because it is responsible for logical addressing and routing functions. This layer is closely associated with the IP protocol and routing hardware, which are essential components for establishing connections and routing data across networks. The network layer ensures that data packets are properly addressed and routed to their intended destinations, enabling communication between different networks.

    Rate this question:

  • 10. 

    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

    • Coaxial

    • CAT3

    • CAT3

    • CAT5e

    Correct Answer
    A. CAT5e
    Explanation
    CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial and CAT3 cables are not capable of achieving this speed.

    Rate this question:

  • 11. 

    The primary network architecture used on LANs today is ___________________, coming in many versions it defines the cable and cabling topology as well as the media access method used to get a signal on the media.

    • Arcnet

    • Token Ring

    • Ethernet

    • FDDI

    Correct Answer
    A. Ethernet
    Explanation
    Ethernet is the primary network architecture used on LANs today. It comes in many versions and defines the cable and cabling topology as well as the media access method used to get a signal on the media.

    Rate this question:

  • 12. 

    A network in which all systems are equal and can share and access resources without a central controlling authority would be considered a ________________ network.

    • Client/server

    • Converged

    • Peer to peer

    • SOHO

    Correct Answer
    A. Peer to peer
    Explanation
    A network in which all systems are equal and can share and access resources without a central controlling authority would be considered a peer to peer network. In this type of network, each device can act as both a client and a server, allowing for direct communication and resource sharing between devices without the need for a centralized server. This decentralized structure provides increased flexibility and resilience, as there is no single point of failure.

    Rate this question:

  • 13. 

    Including the logical source and destination addressing a _________________ is created by the IP protocol at the network layer and is one of the more common terms for referencing data flowing through a network.

    • Frame

    • Packet

    • Segment

    • Data

    Correct Answer
    A. Packet
    Explanation
    In networking, data is divided into smaller units called packets at the network layer. These packets contain the logical source and destination addressing information, allowing them to be routed through the network. Therefore, the correct term for referencing data flowing through a network is "packet".

    Rate this question:

  • 14. 

    The transport of choice for streaming audio and video is _____________ because of its speed and efficiency due to its lack of overhead and very simple header.

    • Tcp

    • Udp

    • Ip

    • Sip

    Correct Answer
    A. Udp
    Explanation
    UDP (User Datagram Protocol) is the correct answer because it is the transport of choice for streaming audio and video. UDP is preferred over TCP (Transmission Control Protocol) because it offers faster and more efficient communication. UDP lacks the overhead and complexity of TCP, making it suitable for real-time applications like streaming media where speed and efficiency are crucial. Additionally, UDP's simple header structure allows for faster processing and delivery of data packets.

    Rate this question:

  • 15. 

    Every device has a direct connection (physically or virtually) to every other device you end up with a _____________ network.

    • Spaghetti

    • Mesh

    • Partial hybrid

    • Hub & spoke

    Correct Answer
    A. Mesh
    Explanation
    A mesh network is formed when every device in the network is directly connected to every other device, either physically or virtually. This means that there are multiple paths for data to travel, increasing reliability and redundancy. In a mesh network, devices can communicate with each other directly, without relying on a central hub or a single point of failure. This makes mesh networks suitable for large-scale deployments and environments where connectivity is critical.

    Rate this question:

  • 16. 

    For every predetermined amount of data TCP sends the receiving station will send an _____________________ to let the source system know what it is expecting next.

    • Open invite

    • Acknowledgment

    • Authorization request

    • ENF (expected next frame)

    Correct Answer
    A. Acknowledgment
    Explanation
    When TCP sends a predetermined amount of data, the receiving station will send an acknowledgment to let the source system know what it is expecting next. This acknowledgment serves as a confirmation that the data has been successfully received and indicates the next expected frame or data sequence. This helps ensure reliable and orderly data transmission between the sender and receiver in TCP/IP communication.

    Rate this question:

  • 17. 

    _____________________ IP addressing can be labor intensive and error prone, and often only undertaken by a network administrator in small network installations where the manual addition of IP address information is relatively straight-forward.

    • Static

    • Dynamic

    • Domain

    • Active

    Correct Answer
    A. Static
    Explanation
    Static IP addressing is the correct answer because it refers to the method of assigning a fixed IP address to a device on a network. This means that the IP address does not change and remains constant, which can be beneficial in certain situations. It is mentioned in the explanation that IP addressing can be labor intensive and error prone, indicating that manually adding IP address information is a time-consuming task. Therefore, using static IP addressing can simplify the process, especially in small network installations where the addition of IP address information is relatively straightforward.

    Rate this question:

  • 18. 

    A one to everyone communication is known as a ______________________ and even on a switched network all connected and active hosts will receive and process the message. This type of communication will continue flowing through the network until reaching a router at which point it is stopped.

    • Broadcast

    • Multicast

    • Unicast

    • Anycast

    Correct Answer
    A. Broadcast
    Explanation
    A one to everyone communication is known as a broadcast and even on a switched network all connected and active hosts will receive and process the message. This type of communication will continue flowing through the network until reaching a router at which point it is stopped.

    Rate this question:

  • 19. 

    At which of the following layers does the TCP protocol operate?

    • Layer 1

    • Layer4

    • Layer 6

    • Layer 7

    Correct Answer
    A. Layer4
    Explanation
    The TCP (Transmission Control Protocol) operates at Layer 4 of the OSI model, which is the Transport Layer. This layer is responsible for establishing and maintaining reliable end-to-end connections between hosts, ensuring the ordered and error-free delivery of data packets. TCP provides features like flow control, congestion control, and error detection to ensure reliable transmission of data over IP networks.

    Rate this question:

  • 20. 

    UTP wires are twisted in pairs to help reduce the effects of this interference.

    • Cross-talk

    • EMI

    • RFI

    • Duplex

    Correct Answer
    A. Cross-talk
    Explanation
    UTP wires are twisted in pairs to help reduce the effects of cross-talk. Cross-talk is a phenomenon in which signals from one wire interfere with signals on adjacent wires, causing distortion or loss of data. By twisting the wires in pairs, the electromagnetic fields generated by each wire cancel each other out, minimizing the cross-talk. This helps to ensure that the signals transmitted through the UTP wires remain clear and free from interference.

    Rate this question:

  • 21. 

    Which of the following is a secure method of remote access via command line?

    • RCP

    • Telnet

    • RSH

    • SSH

    Correct Answer
    A. SSH
    Explanation
    SSH (Secure Shell) is a secure method of remote access via command line. Unlike Telnet, RCP, and RSH, SSH provides encryption and authentication, ensuring that the connection between the client and the server is secure. It uses cryptographic techniques to protect the data transmitted over the network, making it a reliable and secure method for remote access and management of systems.

    Rate this question:

  • 22. 

    Which of the following logical network topologies is used to provide a secure connection across the Internet?

    • VLAN

    • Peer to Peer

    • VTP

    • VPN

    Correct Answer
    A. VPN
    Explanation
    A VPN (Virtual Private Network) is used to provide a secure connection across the Internet. It creates a private network over a public network, such as the Internet, allowing users to securely access and transmit data. VPNs use encryption and tunneling protocols to ensure that data is protected and secure from unauthorized access. This makes VPNs an ideal choice for organizations or individuals who need to connect to a network remotely while maintaining privacy and security.

    Rate this question:

  • 23. 

    In which of the following layers of the OSI model does the TCP protocol operate?

    • Session

    • Network

    • Data link

    • Transport

    Correct Answer
    A. Transport
    Explanation
    The TCP protocol operates in the Transport layer of the OSI model. The Transport layer is responsible for ensuring reliable communication between end systems. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data packets. It handles the segmentation, reassembly, and flow control of data, ensuring that data is delivered accurately and efficiently.

    Rate this question:

  • 24. 

    A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

    • DHCP

    • ARP

    • DNS

    • PING

    Correct Answer
    A. ARP
    Explanation
    The Address Resolution Protocol (ARP) would provide the needed information. ARP is used to map an IP address to a MAC address on a local network. In this case, the network technician can use ARP to obtain the MAC address of the workstation with the IP address 192.168.1.45, which will help identify the workstation's packets in the packet analyzer.

    Rate this question:

  • 25. 

    L2TP and PPTP are protocols associated with what service?

    • Web

    • Email

    • File transfer

    • VPN

    Correct Answer
    A. VPN
    Explanation
    L2TP (Layer 2 Tunneling Protocol) and PPTP (Point-to-Point Tunneling Protocol) are both protocols that are commonly used in VPN (Virtual Private Network) services. VPNs allow users to securely connect to a private network over a public network, such as the internet. L2TP and PPTP are used to establish and maintain the secure tunnel between the user's device and the VPN server, ensuring that data transmitted over the connection remains encrypted and protected from unauthorized access. Therefore, the correct answer is VPN.

    Rate this question:

  • 26. 

    An administrator replaced a router with a switch. End users are able to access network shares but are not able to access the Internet. Which of the following is the BEST explanation why the users are unable to access the Internet?

    • Router routes traffic between different networks and a switch does not

    • The new switch is faulty and needs to be replaced and configured correctly

    • The firewall needs to be setup to allow traffic to reach the Internet

    • The switch needs to be setup to forward data traffic to the Internet

    Correct Answer
    A. Router routes traffic between different networks and a switch does not
    Explanation
    A switch is a networking device that connects devices within a local network, while a router is responsible for routing traffic between different networks. In this scenario, the administrator replaced the router with a switch, which means that the switch is not capable of routing traffic between the local network and the Internet. Therefore, the users are unable to access the Internet because the switch does not have the functionality to route traffic to the Internet.

    Rate this question:

  • 27. 

    One of the primary functions of the Transport layer __________________, performed by both TCP and UDP, is the process of breaking up data from the Application layer into acceptable sized pieces that will be able to fit onto the underlying network infrastructure.

    • Sliding windows

    • Session establishment

    • Segmentation

    • Logical addressing

    Correct Answer
    A. Segmentation
    Explanation
    The correct answer is segmentation. The Transport layer, performed by both TCP and UDP, breaks up data from the Application layer into acceptable sized pieces called segments. This is necessary to ensure that the data can fit onto the underlying network infrastructure. Segmentation allows for efficient transmission and reassembly of data packets, improving the overall reliability and performance of the network communication.

    Rate this question:

  • 28. 

    Logical addressing today is pretty much exclusively represented by ___________________.

    • MAC address

    • IP address

    • HTTP address

    • ARP address

    Correct Answer
    A. IP address
    Explanation
    Logical addressing today is pretty much exclusively represented by IP address. This is because IP (Internet Protocol) address is used to identify and locate devices within a network. It provides a unique numerical label to each device, allowing them to communicate and exchange data over the internet. MAC address is a hardware address used at the data link layer, HTTP address is a protocol used for web communication, and ARP address is used for mapping IP addresses to MAC addresses. However, when it comes to logical addressing, IP address is the primary and widely used method.

    Rate this question:

  • 29. 

    The ________________ layers of the OSI model including Datalink and Physical take care of the physical addressing of host to host communications as well as encoding the 1’s and 0’s into some form of current, pulse or signal onto the media.

    • Transport

    • Network

    • Upper

    • Lower

    Correct Answer
    A. Lower
    Explanation
    The lower layers of the OSI model, including the Datalink and Physical layers, are responsible for the physical addressing of host to host communications. They also handle the encoding of 1's and 0's into some form of current, pulse, or signal onto the media. These layers deal with the actual transmission of data over the physical network, ensuring that the data is properly encoded and transmitted to the intended destination.

    Rate this question:

  • 30. 

    Which secure command line utility is used for remote management of a cisco router or switch?

    • Telnet

    • SSH

    • RDP

    • CISC

    Correct Answer
    A. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it is a secure command line utility used for remote management of a Cisco router or switch. Telnet is not secure as it transmits data in plain text, making it vulnerable to eavesdropping. RDP (Remote Desktop Protocol) is used for remote desktop access, not specifically for managing Cisco devices. CISC is not a command line utility or a protocol used for remote management.

    Rate this question:

  • 31. 

    It’s impossible for a system to communicate directly with a destination system that is on a different network. How can systems on different networks share information?

    • They work through the DNS server

    • They do it through a Microsoft/Unix/Linux network servers

    • They do it through their default gateways (local routers)

    • They are able to communicate directly using IP addresses instead of MAC addresses

    Correct Answer
    A. They do it through their default gateways (local routers)
    Explanation
    Systems on different networks share information by sending their data through their default gateways, which are local routers. These routers act as intermediaries, forwarding the data between the different networks. When a system wants to communicate with a destination on a different network, it sends the data to its default gateway, which then routes it to the appropriate destination network. This allows systems on different networks to communicate and share information effectively.

    Rate this question:

  • 32. 

    The combination of an IP address and a port number known as a ___________________ is how specific services on specific servers are identified. For example 172.16.10.10:80 would identify a system with an IP address of 172.16.10.10 who is hosting a web site.

    • Smap

    • FQDN

    • Port forwarding address

    • Socket

    Correct Answer
    A. Socket
    Explanation
    A socket is the combination of an IP address and a port number that is used to identify specific services on specific servers. It allows communication between different systems over a network. In the given example, 172.16.10.10:80 represents a system with the IP address 172.16.10.10 hosting a web site, with port 80 being used for web traffic.

    Rate this question:

  • 33. 

    Two types of interference that can interfere with UTP based network communication signals are _______________ and ________________. (choose 2)

    • EMI

    • TIA

    • CPE

    • RFI

    Correct Answer(s)
    A. EMI
    A. RFI
    Explanation
    EMI (Electromagnetic Interference) and RFI (Radio Frequency Interference) are two types of interference that can disrupt UTP (Unshielded Twisted Pair) based network communication signals. EMI is caused by electromagnetic radiation from various sources such as power lines, motors, and fluorescent lights. It can introduce noise and distort the signals, leading to data corruption and communication errors. RFI, on the other hand, is caused by radio frequency signals from devices like cell phones, radios, and wireless networks. These signals can interfere with the UTP signals, causing degradation in the quality and performance of the network communication.

    Rate this question:

  • 34. 

    What does a system need before they can communicate directly with another system on the same network?

    • System name

    • The destination system subnet mask

    • DNS server IP

    • Destination MAC address

    Correct Answer
    A. Destination MAC address
    Explanation
    Before a system can communicate directly with another system on the same network, it needs the destination MAC address. The MAC address is a unique identifier assigned to each network interface card (NIC) and is used to identify and communicate with specific devices on a local network. By knowing the destination MAC address, a system can send data packets directly to the intended recipient on the same network.

    Rate this question:

  • 35. 

    Made up of the first 3 bytes (24 bits) of the MAC address the ________________ uniquely identifies the manufacturer of the NIC or interface that the address is assigned to.

    • IDE

    • MAN

    • GUID

    • OUI

    Correct Answer
    A. OUI
    Explanation
    The OUI (Organizationally Unique Identifier) is made up of the first 3 bytes (24 bits) of the MAC address. It uniquely identifies the manufacturer of the NIC (Network Interface Card) or interface that the address is assigned to. This identifier helps in identifying the specific company or organization responsible for producing the network device.

    Rate this question:

  • 36. 

    Which of the following processes translates a private IP address for a public IP address?

    • NAT

    • DNS

    • DHCP

    • PAT

    Correct Answer
    A. NAT
    Explanation
    NAT (Network Address Translation) is the process that translates a private IP address to a public IP address. It allows multiple devices on a private network to share a single public IP address when communicating with devices on the internet. NAT modifies the IP header of outgoing packets, replacing the private IP address with the public IP address, and vice versa for incoming packets, enabling communication between the private and public networks. DNS (Domain Name System) is responsible for translating domain names to IP addresses, DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network, and PAT (Port Address Translation) is a variant of NAT that translates both IP addresses and port numbers.

    Rate this question:

  • 37. 

    MAC or physical addresses are divided into two parts. The second part is just a unique number assigned to each component coming off the assembly line. The first part of the MAC is known as the OUI and is used for which of the following?

    • Over or Under Input field (used for local or remote communications)

    • Organization unique identifier (to identify the manufacturer of the component)

    • IEEE standards number (to indicate the standard - Ethernet for example)

    • To identify whether the number that follows is to be a unicast, multicast or broadcast

    Correct Answer
    A. Organization unique identifier (to identify the manufacturer of the component)
    Explanation
    The first part of the MAC address, known as the OUI (Organization Unique Identifier), is used to identify the manufacturer of the component. It is a unique number assigned to each component coming off the assembly line, allowing the identification of the manufacturer. This information is useful in various networking scenarios, such as troubleshooting, inventory management, and ensuring compatibility between different components.

    Rate this question:

  • 38. 

    Required to make an IP address meaninful, the _________________ hides the host portion of an IP address allowing hosts to determine if a destination is local (on the same network segment) or remote (beyond the local router) so they know which MAC address will be needed to forward the frame.

    • Default gateway

    • Subnet mask

    • APIPA address

    • OUI

    Correct Answer
    A. Subnet mask
    Explanation
    The subnet mask hides the host portion of an IP address, allowing hosts to determine if a destination is local or remote. By comparing the subnet mask of the host with the destination IP address, the host can determine if the destination is on the same network segment or beyond the local router. This information is important because hosts need to know the MAC address of the destination in order to forward the frame correctly.

    Rate this question:

  • 39. 

    In the data encapsulation process the PDU created at the Transport layer is commonly called a ____________________.

    • Message

    • Segment

    • Packet

    • Frame

    Correct Answer
    A. Segment
    Explanation
    In the data encapsulation process, the PDU created at the Transport layer is commonly called a segment.

    Rate this question:

  • 40. 

    This device breaks up collision domains and keeps track of what device or devices are connected to each port.

    • Hub

    • Switch

    • Router

    • WAP

    • Console

    Correct Answer
    A. Switch
    Explanation
    A switch is a networking device that breaks up collision domains, which allows for more efficient communication between devices on a network. It also keeps track of what device or devices are connected to each of its ports, allowing for better management and control of network traffic. Unlike a hub, which simply broadcasts data to all connected devices, a switch intelligently directs data only to the device it is intended for, improving network performance and security. A router, on the other hand, is responsible for connecting different networks together, while a WAP is a wireless access point used for connecting wireless devices to a network. A console typically refers to a device used for managing and configuring network devices.

    Rate this question:

  • 41. 

    Paying a usage fee to leverage a larger corporations excess network resources to offer services to your own network users and clients (as opposed to purchasing/setting up/configuring the necessary hardware yourself) would be an example of ______________________.

    • Cloud computing

    • Collaboration software

    • Client/server networking

    • Peer-to-peer network

    Correct Answer
    A. Cloud computing
    Explanation
    Paying a usage fee to leverage a larger corporation's excess network resources to offer services to your own network users and clients aligns with the concept of cloud computing. In cloud computing, resources such as storage, servers, and software are provided over the internet on a pay-as-you-go basis, eliminating the need for organizations to invest in and maintain their own hardware infrastructure. This allows businesses to scale their operations quickly and efficiently while focusing on their core competencies.

    Rate this question:

  • 42. 

    What does the tracert utility mostly help with?

    • Troubleshooting ICMP errors

    • Troubleshooting ARP broadcasting

    • Troubleshooting routers

    • Troubleshooting name resolution

    Correct Answer
    A. Troubleshooting routers
    Explanation
    The tracert utility is primarily used for troubleshooting routers. It helps in identifying the path taken by data packets from the source to the destination by sending out ICMP echo requests with incrementing TTL values. By analyzing the response time and the routers encountered along the way, network administrators can pinpoint any issues or bottlenecks in the network infrastructure. This makes tracert a valuable tool for diagnosing and resolving router-related problems.

    Rate this question:

  • 43. 

    The ____________ protocol provides error messaging for IP communications as well as a handy echo request / reply mechanism used by the ping utility to verify connectivity on the network.

    • OSPF

    • ICMP

    • ARP

    • IGMP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer. ICMP is a protocol that provides error messaging for IP communications. It is also used by the ping utility to send echo request messages and receive echo reply messages, which helps in verifying connectivity on the network. The ping utility sends an ICMP echo request message to a destination IP address and waits for an ICMP echo reply message from the destination. This mechanism is commonly used to troubleshoot network connectivity issues.

    Rate this question:

  • 44. 

    In order for computers with private IP addresses to access the public Internet, which of the following must the router perform?

    • NAT

    • BGP

    • DHCP

    • APIPA

    Correct Answer
    A. NAT
    Explanation
    The router must perform Network Address Translation (NAT) in order for computers with private IP addresses to access the public Internet. NAT allows the router to translate the private IP addresses of the computers into a single public IP address that can be recognized and routed on the Internet. This allows multiple devices on a private network to share a single public IP address, conserving IP address space and providing a level of security by hiding the private IP addresses from the public network.

    Rate this question:

  • 45. 

    What information can the Netstat command line utility provide?

    • Verify local and remote connectivity

    • Identifies all the routers between your system and a remote destination system

    • Displays all IP address configuration information

    • Displays all open connections along with protocols and ports used

    Correct Answer
    A. Displays all open connections along with protocols and ports used
    Explanation
    The Netstat command line utility can provide information about all open connections on a system, including the protocols and ports being used. This can be useful for troubleshooting network connectivity issues or identifying any unauthorized connections. It does not verify local and remote connectivity, identify routers, or display IP address configuration information.

    Rate this question:

  • 46. 

    Who would the following destination MAC address be sent to by a switch? FF:FF:FF:FF:FF:FF

    • Only the default gateway (local router)

    • The world

    • Everyone on the local network

    • To the special group of devices associated with that multicast address

    Correct Answer
    A. Everyone on the local network
    Explanation
    The destination MAC address FF:FF:FF:FF:FF:FF is the broadcast address, which means it is sent to all devices on the local network. Broadcast messages are intended to be received by every device on the network, so the switch would forward this message to everyone on the local network.

    Rate this question:

  • 47. 

    This device breaks up broadcast domains and keeps track of and connects networks together.

    • Hub

    • Switch

    • Router

    • Bridge

    • Console

    Correct Answer
    A. Router
    Explanation
    A router is a device that breaks up broadcast domains and keeps track of and connects networks together. Unlike a hub or switch, which simply forwards data to all connected devices, a router examines the destination IP address of each packet and determines the best path for it to reach its destination. This allows different networks to communicate with each other and enables the routing of data between them. A bridge is similar to a switch but operates at the data link layer, not the network layer, so it does not perform the same routing functions as a router. A console is a device used for managing and configuring network devices, but it does not break up broadcast domains or connect networks together.

    Rate this question:

  • 48. 

    The Internet is no longer just made up of files to upload or download or web sites to visit. Today home and business security systems connect to the Internet and can notify mobile devices as events happen, Cities can control their power grid and traffic light environments to optimize their use, lighting, appliances, store inventory systems and many more things all are interconnected creating what some call _____________________________.

    • A collaborative network

    • The Internet of Things

    • Network saturation

    • A WAN

    Correct Answer
    A. The Internet of Things
    Explanation
    The given correct answer is "the Internet of Things". This term refers to the network of physical devices, vehicles, appliances, and other objects that are embedded with sensors, software, and connectivity, enabling them to connect and exchange data. It encompasses the idea that various devices and systems can communicate with each other through the internet, allowing for automation, data collection, and improved efficiency in various aspects of life and industries.

    Rate this question:

  • 49. 

    A one to a group communication known as a ___________________ is used to share data with only those systems that are running the same application or service and thus are part of a specific group of systems.

    • Broadcast

    • Multicast

    • Unicast

    • Anycast

    Correct Answer
    A. Multicast
    Explanation
    Multicast is the correct answer because it refers to a one-to-a-group communication where data is shared with systems running the same application or service. In multicast, the data is sent to a specific group of systems, allowing them to receive and process the information simultaneously. This method is efficient for distributing data to multiple recipients, reducing network traffic and improving overall performance.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 07, 2018
    Quiz Created by
    Timlem
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.