Basic CISCO Networking Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By PremierGaou
P
PremierGaou
Community Contributor
Quizzes Created: 3 | Total Attempts: 57,674
| Attempts: 17,487 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. What is the 2nd layer of the OSI model?

Explanation

Physical is the 1st layer. Presentation is the 6th layer. Internet is a TCP/IP model layer, not an OSI layer

Submit
Please wait...
About This Quiz
Basic CISCO Networking Quiz - Quiz

How good are you at computer networking? Play this informative Cisco Computer Networking quiz and gauge your skills and knowledge. This quiz contains many factual, conceptual, and analytical... see morequestions that will put to the test your understanding of the concepts. The quiz contains questions based on easy, medium, to hard levels that will help you enhance your knowledge. The quiz will also be helpful for a last-minute revision before the exam. If you like this quiz, share it with your friends.
see less

2. What are the characteristics of TCP?

Explanation

TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol used for transmitting data over a network. It ensures that data is delivered in the correct order and without errors. TCP uses error-checking mechanisms such as checksums to verify the integrity of data during transmission. It also establishes a connection between the sender and receiver before data transfer, ensuring that data is delivered in the correct sequence. Therefore, the characteristics of TCP are connection-oriented, error-checking, and reliable.

Submit
3. What is the function of DNS?

Explanation

DHCP allocates IP address

Submit
4. What is the physical address of a network interface card?

Explanation

The physical address of a network interface card is commonly referred to as the MAC (Media Access Control) address. The MAC address is a unique identifier assigned to each network interface card by the manufacturer. It is used to identify devices on a network at the hardware level. The MAC address is a combination of six pairs of alphanumeric characters, separated by colons or hyphens. Unlike IP addresses, MAC addresses are assigned to the hardware itself and do not change, making them a reliable way to identify network devices.

Submit
5. Which of the following does not encrypt data?

Explanation

Telnet does not encrypt data. Telnet is a network protocol that allows remote access to computers over a network. It is an unsecured protocol, meaning that the data transmitted over Telnet is sent in plain text and can be easily intercepted and read by anyone with access to the network. In contrast, SSH, SSL, and IPsec are all encryption protocols that provide secure communication by encrypting the data transmitted between devices, ensuring privacy and preventing unauthorized access.

Submit
6. Which of the following would be used to connect two geographically separated addresses?

Explanation

A router would be used to connect two geographically separated addresses. Routers are networking devices that forward data packets between networks. They determine the best path for data to travel from one network to another, which makes them ideal for connecting geographically separated addresses. Routers can also provide security features such as firewall protection. Switches, hubs, and bridges are also networking devices, but they are typically used to connect devices within a local network rather than connecting geographically separated addresses.

Submit
7. How many bits does an IPv6 address use?

Explanation

IPv6 uses 128 bits while IPv4 uses 32 bits

Submit
8. What is the first step of the TCP three-way handshake?

Explanation

The three-way handshake is as follows: host sends SYN, server sends ACK, host sends SYN-ACK

Submit
9. Which of the following is a private IP address

Explanation

The IP address 192.168.0.0 is a private IP address because it falls within the range of private IP addresses defined by the Internet Assigned Numbers Authority (IANA). These private IP addresses are reserved for use within private networks and are not routable on the public internet. The other three IP addresses mentioned (11.0.0.0, 173.12.0.0, and 190.170.0.0) do not fall within the range of private IP addresses and are therefore not considered private.

Submit
10. What OSI layer does a switch reside on?

Explanation

A switch is a networking device that operates at the data link layer of the OSI model. This layer is responsible for the reliable transmission of data between adjacent network nodes. Switches use MAC addresses to forward data packets within a local area network (LAN). Therefore, the correct answer is "Datalink."

Submit
11. Which of the following ports use TCP?

Explanation

FTP (File Transfer Protocol) is a standard network protocol used for transferring files from one host to another over a TCP-based network, such as the internet. TCP (Transmission Control Protocol) is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and without errors. Therefore, FTP uses TCP as its underlying transport protocol to establish a reliable connection between the client and server, ensuring the successful transfer of files. TFTP (Trivial File Transfer Protocol), DHCP (Dynamic Host Configuration Protocol), and NTP (Network Time Protocol) do not use TCP as their transport protocol.

Submit
12. In a class B IP address, which two octets are reserved for the host?

Explanation

In a class B IP address, the third and fourth octets are reserved for the host. Class B IP addresses have a default subnet mask of 255.255.0.0, which means the first two octets represent the network portion, while the last two octets represent the host portion. Therefore, the third and fourth octets are used to identify individual hosts within the network.

Submit
13. Which subnet mask will allow for 16 hosts?

Explanation

The subnet mask that will allow for 16 hosts is 255.255.255.2401. This subnet mask provides 16 addresses, but keep in mind that in a subnet, the first address is reserved for the network address and the last address is reserved for the broadcast address, leaving 14 usable addresses for hosts. So, the correct answer to your question is 255.255.255.240.

Submit
14. What would UDP be used for?

Explanation

File-sharing, downloading, and e-mail require error-free guaranteed delivery so they use TCP. VoIP needs fast data transmission and does not require error-checking so it uses UDP

Submit
15. The Transport layer of the OSI model communicates with which two layers?

Explanation

An OSI layer only communicate with the immediately adjacent layers. Therefore, the 4th layer (Transport) only communicates with the 5th (Session) and 3rd (Network) layers.

Submit
16. What is the function of ARP?

Explanation

ARP (Address Resolution Protocol) is responsible for converting an IP address to a physical address, also known as a MAC address. This is necessary because IP addresses are used for routing data over the internet, while MAC addresses are used for communication within a local network. ARP allows devices to find the MAC address of another device on the same network by sending an ARP request. Once the MAC address is obtained, the device can establish a direct connection and communicate with the intended recipient.

Submit
17. At what OSI layer does a hub reside?

Explanation

A hub operates at the physical layer of the OSI model. The physical layer is responsible for the transmission and reception of raw data bits over a physical medium, such as cables. Hubs simply receive incoming data and broadcast it to all connected devices without any intelligence or filtering. They do not analyze or interpret the data at higher layers of the OSI model. Therefore, a hub is considered to be a physical layer device.

Submit
18. Which command will display all connections and listening ports?

Explanation

netstat -n will display addresses and port numbers in numerical form. nbtstat -a will list the remote machine's name table given its name. trace -n is not a valid command

Submit
19. Which protocol uses port 23?

Explanation

FTP uses port 21. SMTP uses port 25. HTTP uses port 80

Submit
20. Which of the following is a class B address?

Explanation

A class B address is identified by the first two octets, which range from 128 to 191. In the given options, the address 190.152.60.32 falls within this range, making it a class B address.

Submit
21. Which of the following will refresh all DHCP leases?

Explanation

The correct answer is ipconfig /renew because it is the command in Windows that initiates the process of refreshing DHCP leases. When you run ipconfig /renew, your computer sends a request to the DHCP server to extend or renew its current DHCP lease. This is important because DHCP leases have a limited duration, and by renewing them, your computer can continue to use the same IP address and network configuration without interruption.

Submit
22. Which of the following options is used to set a ping's TTL?

Explanation

-t pings the destination host until interrupted. -a resolves addresses to hostnames. -w sets timeout in milliseconds to wait for each reply

Submit
23. Which of the following would be used to detect attacks?

Explanation

An IDS (Intrusion Detection System) is a security tool used to detect attacks on a network or system. It monitors network traffic and analyzes it for any suspicious or malicious activity. IDS can detect various types of attacks, such as unauthorized access attempts, malware infections, and unusual network behavior. It alerts the system administrators or security personnel when an attack is detected, allowing them to take appropriate action to protect the network or system. Unlike a firewall, which mainly focuses on blocking unauthorized access, an IDS is specifically designed to identify and respond to attacks.

Submit
24. Which command will traceroute and provide network latency and packet loss for each router and link in the path?

Explanation

ping will test a network connection. route will manipulate network routing tables. tracert will trace route to a remote host

Submit
25. Which command will query all records on a name server?

Explanation

nslookup -a will list aliases and canonical names. get-dns is not a CMD command. netview -a is not a valid command

Submit
View My Results

Quiz Review Timeline (Updated): Jun 28, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 10, 2014
    Quiz Created by
    PremierGaou
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the 2nd layer of the OSI model?
What are the characteristics of TCP?
What is the function of DNS?
What is the physical address of a network interface card?
Which of the following does not encrypt data?
Which of the following would be used to connect two geographically...
How many bits does an IPv6 address use?
What is the first step of the TCP three-way handshake?
Which of the following is a private IP address
What OSI layer does a switch reside on?
Which of the following ports use TCP?
In a class B IP address, which two octets are reserved for the host?
Which subnet mask will allow for 16 hosts?
What would UDP be used for?
The Transport layer of the OSI model communicates with which two...
What is the function of ARP?
At what OSI layer does a hub reside?
Which command will display all connections and listening ports?
Which protocol uses port 23?
Which of the following is a class B address?
Which of the following will refresh all DHCP leases?
Which of the following options is used to set a ping's TTL?
Which of the following would be used to detect attacks?
Which command will traceroute and provide network latency...
Which command will query all records on a name server?
Alert!

Advertisement