Basic CISCO Networking Quiz

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by PremierGaou
P
PremierGaou
Community Contributor
Quizzes Created: 3 | Total Attempts: 44,209
Questions: 25 | Attempts: 9,164

SettingsSettingsSettings
Basic CISCO Networking Quiz - Quiz

How good are you at computer networking? Play this informative Cisco Computer Networking quiz and gauge your skills and knowledge. This quiz contains many factual, conceptual, and analytical questions that will put to the test your understanding of the concepts. The quiz contains questions based on easy, medium, to hard levels that will help you enhance your knowledge. The quiz will also be helpful for a last-minute revision before the exam. If you like this quiz, share it with your friends.


Questions and Answers
  • 1. 

    What is the physical address of a network interface card?

    • A. 

      NIC

    • B. 

      MAC

    • C. 

      IP

    • D. 

      ARP

    Correct Answer
    B. MAC
    Explanation
    The physical address of a network interface card is commonly referred to as the MAC (Media Access Control) address. The MAC address is a unique identifier assigned to each network interface card by the manufacturer. It is used to identify devices on a network at the hardware level. The MAC address is a combination of six pairs of alphanumeric characters, separated by colons or hyphens. Unlike IP addresses, MAC addresses are assigned to the hardware itself and do not change, making them a reliable way to identify network devices.

    Rate this question:

  • 2. 

    In a class B IP address, which two octets are reserved for the host?

    • A. 

      First and Second

    • B. 

      Second and Fourth

    • C. 

      Second and Third

    • D. 

      Third and Fourth

    Correct Answer
    D. Third and Fourth
    Explanation
    In a class B IP address, the third and fourth octets are reserved for the host. Class B IP addresses have a default subnet mask of 255.255.0.0, which means the first two octets represent the network portion, while the last two octets represent the host portion. Therefore, the third and fourth octets are used to identify individual hosts within the network.

    Rate this question:

  • 3. 

    What are the characteristics of TCP?

    • A. 

      Connection-oriented, error-checking, reliable

    • B. 

      Connectionless, no error-checking, unreliable

    • C. 

      Connection-oriented, error-checking, unreliable

    • D. 

      Connectionless, error-checking, reliable

    Correct Answer
    A. Connection-oriented, error-checking, reliable
    Explanation
    TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol used for transmitting data over a network. It ensures that data is delivered in the correct order and without errors. TCP uses error-checking mechanisms such as checksums to verify the integrity of data during transmission. It also establishes a connection between the sender and receiver before data transfer, ensuring that data is delivered in the correct sequence. Therefore, the characteristics of TCP are connection-oriented, error-checking, and reliable.

    Rate this question:

  • 4. 

    Which of the following is a class B address?

    • A. 

      10.23.54.22

    • B. 

      190.152.60.32

    • C. 

      127.55.22.34

    • D. 

      192.123.12.88

    Correct Answer
    B. 190.152.60.32
    Explanation
    A class B address is identified by the first two octets, which range from 128 to 191. In the given options, the address 190.152.60.32 falls within this range, making it a class B address.

    Rate this question:

  • 5. 

    What OSI layer does a switch reside on?

    • A. 

      Datalink

    • B. 

      Network

    • C. 

      Application

    • D. 

      Physical

    Correct Answer
    A. Datalink
    Explanation
    A switch is a networking device that operates at the data link layer of the OSI model. This layer is responsible for the reliable transmission of data between adjacent network nodes. Switches use MAC addresses to forward data packets within a local area network (LAN). Therefore, the correct answer is "Datalink."

    Rate this question:

  • 6. 

    Which of the following ports use TCP?

    • A. 

      TFTP

    • B. 

      DHCP

    • C. 

      FTP

    • D. 

      NTP

    Correct Answer
    C. FTP
    Explanation
    FTP (File Transfer Protocol) is a standard network protocol used for transferring files from one host to another over a TCP-based network, such as the internet. TCP (Transmission Control Protocol) is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and without errors. Therefore, FTP uses TCP as its underlying transport protocol to establish a reliable connection between the client and server, ensuring the successful transfer of files. TFTP (Trivial File Transfer Protocol), DHCP (Dynamic Host Configuration Protocol), and NTP (Network Time Protocol) do not use TCP as their transport protocol.

    Rate this question:

  • 7. 

    At what OSI layer does a hub reside?

    • A. 

      Physical

    • B. 

      Transport

    • C. 

      Datalink

    • D. 

      Session

    Correct Answer
    A. Physical
    Explanation
    A hub operates at the physical layer of the OSI model. The physical layer is responsible for the transmission and reception of raw data bits over a physical medium, such as cables. Hubs simply receive incoming data and broadcast it to all connected devices without any intelligence or filtering. They do not analyze or interpret the data at higher layers of the OSI model. Therefore, a hub is considered to be a physical layer device.

    Rate this question:

  • 8. 

    Which of the following would be used to detect attacks?

    • A. 

      Firewall

    • B. 

      IDS

    • C. 

      DMZ

    • D. 

      IPS

    Correct Answer
    B. IDS
    Explanation
    An IDS (Intrusion Detection System) is a security tool used to detect attacks on a network or system. It monitors network traffic and analyzes it for any suspicious or malicious activity. IDS can detect various types of attacks, such as unauthorized access attempts, malware infections, and unusual network behavior. It alerts the system administrators or security personnel when an attack is detected, allowing them to take appropriate action to protect the network or system. Unlike a firewall, which mainly focuses on blocking unauthorized access, an IDS is specifically designed to identify and respond to attacks.

    Rate this question:

  • 9. 

    What is the function of ARP?

    • A. 

      Used for network diagnostics and error-reporting

    • B. 

      Discovers other nodes on the network

    • C. 

      Manages network devices

    • D. 

      Converts an IP address to a physical address

    Correct Answer
    D. Converts an IP address to a physical address
    Explanation
    ARP (Address Resolution Protocol) is responsible for converting an IP address to a physical address, also known as a MAC address. This is necessary because IP addresses are used for routing data over the internet, while MAC addresses are used for communication within a local network. ARP allows devices to find the MAC address of another device on the same network by sending an ARP request. Once the MAC address is obtained, the device can establish a direct connection and communicate with the intended recipient.

    Rate this question:

  • 10. 

    Which of the following would be used to connect two geographically separated addresses?

    • A. 

      Router

    • B. 

      Switch

    • C. 

      Hub

    • D. 

      Bridge

    Correct Answer
    A. Router
    Explanation
    A router would be used to connect two geographically separated addresses. Routers are networking devices that forward data packets between networks. They determine the best path for data to travel from one network to another, which makes them ideal for connecting geographically separated addresses. Routers can also provide security features such as firewall protection. Switches, hubs, and bridges are also networking devices, but they are typically used to connect devices within a local network rather than connecting geographically separated addresses.

    Rate this question:

  • 11. 

    What is the 2nd layer of the OSI model?

    • A. 

      Datalink

    • B. 

      Physical

    • C. 

      Internet

    • D. 

      Presentation

    Correct Answer
    A. Datalink
    Explanation
    Physical is the 1st layer. Presentation is the 6th layer. Internet is a TCP/IP model layer, not an OSI layer

    Rate this question:

  • 12. 

    Which protocol uses port 23?

    • A. 

      FTP

    • B. 

      SMTP

    • C. 

      Telnet

    • D. 

      HTTP

    Correct Answer
    C. Telnet
    Explanation
    FTP uses port 21. SMTP uses port 25. HTTP uses port 80

    Rate this question:

  • 13. 

    The Transport layer of the OSI model communicates with which two layers?

    • A. 

      Network, Datalink

    • B. 

      Session, Internet

    • C. 

      Session, Network

    • D. 

      Application, Session

    Correct Answer
    C. Session, Network
    Explanation
    An OSI layer only communicate with the immediately adjacent layers. Therefore, the 4th layer (Transport) only communicates with the 5th (Session) and 3rd (Network) layers.

    Rate this question:

  • 14. 

    Which of the following is a private IP address

    • A. 

      192.168.0.0

    • B. 

      11.0.0.0

    • C. 

      173.12.0.0

    • D. 

      190.170.0.0

    Correct Answer
    A. 192.168.0.0
    Explanation
    The IP address 192.168.0.0 is a private IP address because it falls within the range of private IP addresses defined by the Internet Assigned Numbers Authority (IANA). These private IP addresses are reserved for use within private networks and are not routable on the public internet. The other three IP addresses mentioned (11.0.0.0, 173.12.0.0, and 190.170.0.0) do not fall within the range of private IP addresses and are therefore not considered private.

    Rate this question:

  • 15. 

    How many bits does an IPv6 address use?

    • A. 

      32

    • B. 

      64

    • C. 

      16

    • D. 

      128

    Correct Answer
    D. 128
    Explanation
    IPv6 uses 128 bits while IPv4 uses 32 bits

    Rate this question:

  • 16. 

    Which subnet mask will allow for 16 hosts?

    • A. 

      255.255.255.224

    • B. 

      255.255.255.240

    • C. 

      255.255.255.248

    • D. 

      255.255.255.192

    Correct Answer
    B. 255.255.255.240
    Explanation
    The subnet mask 255.255.255.240 will allow for 16 hosts because it has a subnet mask of 28 bits. In binary, this is represented as 11111111.11111111.11111111.11110000. The first 28 bits are used to identify the network, leaving 4 bits for host addresses. With 4 bits, there are 2^4 = 16 possible combinations, which means 16 hosts can be accommodated within this subnet.

    Rate this question:

  • 17. 

    What is the first step of the TCP three-way handshake?

    • A. 

      Receive SYN

    • B. 

      SYN-ACK

    • C. 

      ACK

    • D. 

      Send SYN

    Correct Answer
    D. Send SYN
    Explanation
    The three-way handshake is as follows: host sends SYN, server sends ACK, host sends SYN-ACK

    Rate this question:

  • 18. 

    What would UDP be used for?

    • A. 

      File sharing

    • B. 

      Downloading

    • C. 

      E-mail

    • D. 

      VoIP

    Correct Answer
    D. VoIP
    Explanation
    File-sharing, downloading, and e-mail require error-free guaranteed delivery so they use TCP. VoIP needs fast data transmission and does not require error-checking so it uses UDP

    Rate this question:

  • 19. 

    What is the function of DNS?

    • A. 

      Allocates IP addresses

    • B. 

      Networking protocol for clock synchronization

    • C. 

      Translates name to numerical IP address

    • D. 

      Maintains distributed directory information services

    Correct Answer
    C. Translates name to numerical IP address
    Explanation
    DHCP allocates IP address

    Rate this question:

  • 20. 

    Which of the following does not encrypt data?

    • A. 

      SSH

    • B. 

      Telnet

    • C. 

      SSL

    • D. 

      IPsec

    Correct Answer
    B. Telnet
    Explanation
    Telnet does not encrypt data. Telnet is a network protocol that allows remote access to computers over a network. It is an unsecured protocol, meaning that the data transmitted over Telnet is sent in plain text and can be easily intercepted and read by anyone with access to the network. In contrast, SSH, SSL, and IPsec are all encryption protocols that provide secure communication by encrypting the data transmitted between devices, ensuring privacy and preventing unauthorized access.

    Rate this question:

  • 21. 

    Which command will display all connections and listening ports?

    • A. 

      Netstat -n

    • B. 

      Trace -n

    • C. 

      Netstat -a

    • D. 

      Nbtstat -a

    Correct Answer
    C. Netstat -a
    Explanation
    netstat -n will display addresses and port numbers in numerical form. nbtstat -a will list the remote machine's name table given its name. trace -n is not a valid command

    Rate this question:

  • 22. 

    Which of the following options is used to set a ping's TTL?

    • A. 

      -i

    • B. 

      -a

    • C. 

      -w

    • D. 

      -t

    Correct Answer
    A. -i
    Explanation
    -t pings the destination host until interrupted. -a resolves addresses to hostnames. -w sets timeout in milliseconds to wait for each reply

    Rate this question:

  • 23. 

    Which command will traceroute and provide network latency and packet loss for each router and link in the path?

    • A. 

      Tracert

    • B. 

      Ping

    • C. 

      Route

    • D. 

      Pathping

    Correct Answer
    D. Pathping
    Explanation
    ping will test a network connection. route will manipulate network routing tables. tracert will trace route to a remote host

    Rate this question:

  • 24. 

    Which command will query all records on a name server?

    • A. 

      Nslookup -d

    • B. 

      Netview -a

    • C. 

      Nslookup -a

    • D. 

      Get-dns

    Correct Answer
    A. Nslookup -d
    Explanation
    nslookup -a will list aliases and canonical names. get-dns is not a CMD command. netview -a is not a valid command

    Rate this question:

  • 25. 

    Which of the following will refresh all DHCP leases?

    • A. 

      Ipconfig /renew

    • B. 

      Ipconfig /registerdns

    • C. 

      Nslookup -r

    • D. 

      Ifconfig /renew

    Correct Answer
    B. Ipconfig /registerdns
    Explanation
    ipconfig /renew wil renew the IP address for the specified adapter. /renew is not a valid option for ifconfig. -r is not a valid option for nslookup.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.