Quiz : How Well Do You Know About Advanced Networking?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bongeagle
B
Bongeagle
Community Contributor
Quizzes Created: 5 | Total Attempts: 36,439
| Attempts: 1,708 | Questions: 29
Please wait...
Question 1 / 29
0 %
0/100
Score 0/100
1. There are ______ bits in an octet?

Explanation

An octet is a sequence of 8 bits, therefore there are 8 bits in an octet. Each bit can have a value of either 0 or 1, and when combined in groups of 8, they form an octet. This is a standard unit of digital information in computing and telecommunication systems.

Submit
Please wait...
About This Quiz
Quiz : How Well Do You Know About Advanced Networking? - Quiz

.
Just how well do you know about advanced networking? Advanced Networks are independent practice associations or integrated delivery system organizations that have entered into SSP arrangements with at least one payer. Why not take this quiz and test your knowledge? Please make sure to read all the questions carefully.... see moreAll the questions in the quiz are designed to make you think and test your knowledge. Interestingly, the quiz can help you learn new things about the concept. There is no time limit on the quiz, so you can take it as many times as you like. Have fun! see less

Personalize your quiz and earn a certificate with your name on it!
2. Unicast is considered a one to one type of communication ?

Explanation

Unicast is indeed considered a one-to-one type of communication. In a unicast communication, data is sent from a single sender to a specific receiver. This means that the sender is targeting a specific recipient and the communication is exclusive between these two parties. Unlike multicast or broadcast communication, where data is sent to multiple recipients simultaneously, unicast ensures that the message is delivered to only one intended recipient. Therefore, the answer "True" is correct.

Submit
3. Which port number is used by SMTP?

Explanation

SMTP (Simple Mail Transfer Protocol) is a protocol used for sending emails. The port number 25 is specifically assigned to SMTP, allowing email clients and servers to communicate with each other. This port is used for establishing a connection between the sender and recipient's mail servers, enabling the transfer of email messages. Therefore, the correct answer is 25.

Submit
4. What is the broadcast address for the network in which 192.168.242.5/20 is located?

Explanation

The broadcast address is the highest possible address in a network and is used to send data to all devices on the network. In this case, the given IP address is 192.168.242.5 with a subnet mask of /20. This means that the network portion of the IP address is 192.168.240.0. Since the subnet mask is /20, the remaining bits in the IP address are all set to 1, resulting in a broadcast address of 192.168.255.255.

Submit
5. Is the transport protocol that manages the individual conversations between web servers and web clients.

Explanation

TCP (Transmission Control Protocol) is the transport protocol that manages the individual conversations between web servers and web clients. TCP ensures reliable and ordered delivery of data packets over the internet. It establishes a connection between the sender and receiver, breaks the data into smaller packets, and ensures that they are received in the correct order. TCP also handles congestion control and flow control to optimize the data transfer process. Overall, TCP plays a crucial role in ensuring the smooth and efficient communication between web servers and clients.

Submit
6. What is the net ID for the network in which 192.168.242.5/20 is located?

Explanation

The net ID for the network in which 192.168.242.5/20 is located is 192.168.240.0. This is because the given IP address has a subnet mask of /20, which means that the first 20 bits are used for the network ID. Therefore, the network ID is obtained by setting the last 12 bits of the given IP address to 0, resulting in 192.168.240.0.

Submit
7. Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?

Explanation

An access layer LAN switch uses Layer 2 of the OSI model to make a forwarding decision. Layer 2, also known as the Data Link Layer, is responsible for the reliable transfer of data between network nodes over a physical link. It handles tasks such as framing, error detection, and flow control. In the case of an access layer switch, it uses Layer 2 information, such as MAC addresses, to determine the appropriate port to forward incoming data packets to their destination within the local network.

Submit
8. Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?

Explanation

The access layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network. This layer is responsible for handling user access and enforcing security policies. It also includes switches and access points that provide connectivity to end devices such as computers, printers, and phones. The access layer acts as a boundary between the end devices and the rest of the network, ensuring that only authorized devices can access the network and controlling the flow of traffic.

Submit
9.  

Explanation

Redundancy refers to the duplication of critical components or systems in order to ensure continued operation in the event of a failure. It is an important factor in maintaining system availability and minimizing downtime. By having redundant systems or backups in place, organizations can mitigate the risk of single points of failure and ensure that operations can continue even if one component fails. This helps to improve the overall reliability and resilience of the system.

Submit
10. Configuring communication between devices on different VLANs requires the use of which layer of the OSI model?

Explanation

Configuring communication between devices on different VLANs requires the use of Layer 3 of the OSI model. Layer 3, also known as the network layer, is responsible for logical addressing, routing, and forwarding of data packets between different networks. VLANs are virtual LANs that separate devices into different broadcast domains, and in order for devices on different VLANs to communicate, a Layer 3 device such as a router is needed to route the traffic between the VLANs.

Submit
11. What is the purpose of TCP/UDP port numbers ?

Explanation

TCP/UDP port numbers are used to track the different conversations crossing the network at the same time. Each conversation or communication session between two devices is assigned a unique port number, which allows the network to differentiate between multiple ongoing conversations. This ensures that the data packets from each conversation are correctly delivered to the intended recipient. By tracking the conversations using port numbers, the network can effectively manage and route the data packets to the correct destinations, enabling simultaneous communication between multiple devices on the network.

Submit
12. End system use port numbers to select the proper applications. What is the lowest port number that can be dynamically assigned by the host system?

Explanation

The lowest port number that can be dynamically assigned by the host system is 1. Port numbers are used to identify specific applications or services running on an end system. The range of port numbers is from 0 to 65535, with the well-known ports (0-1023) reserved for specific protocols and services. Dynamic or ephemeral ports (also known as private ports) are assigned by the host system to client applications for temporary use. These ports typically start from 49152 and go up to 65535. However, the lowest possible dynamic port number is 1.

Submit
13. You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets.  How many hosts per network, and total networks do you get once subnetted.

Explanation

193.103.20.0 Need 50 Networks

128 64 32 16 8 4 2 1

0 0 1 1 0 0 1 0 = 50 in binary
Need to borrow 6 bits for # of Networks

New Subnet Mask = 255.255.255.11111100 (252) or /30
^ Increment = 4

2^6 = # of Networks = 64
2^2-2 = # of Hosts per Network = 2

First 5 IP Ranges
193.103.20.0 - 193.103.20.3
20.4 – 20.7
20.8 – 20.11
20.12 – 20.15
20.16 – 20.19

Submit
14.

Explanation

not-available-via-ai

Submit
15. Is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning them the appropriate addresses, and delivering them across the best path to the destination host.

Explanation

The correct answer is Internet Protocol, IP. IP is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning them the appropriate addresses, and delivering them across the best path to the destination host. IP is a fundamental protocol in the internet protocol suite and is responsible for routing packets across networks. It ensures that packets are properly addressed and delivered to the intended destination.

Submit
16. Which layer of the hierarchical network design model is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?

Explanation

The core layer of the hierarchical network design model is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical. This layer is responsible for providing fast and reliable connectivity between different parts of the network. It typically consists of high-performance routers and switches that can handle large amounts of traffic and ensure that data is efficiently routed between different network segments. The core layer is designed to be highly available and redundant to minimize downtime and ensure continuous network operation.

Submit
17. During data transfer, what is the receiving host responsible for ? Choose two

Explanation

During data transfer, the receiving host is responsible for two tasks: acknowledgement and reassembly. Acknowledgement refers to the process of the receiving host sending a confirmation back to the sending host that the data has been received successfully. This ensures reliable communication and allows the sending host to know that the data reached its destination. Reassembly, on the other hand, involves the receiving host reconstructing the transmitted data from smaller segments or packets. This is necessary because data is often divided into smaller units for efficient transmission over a network, and the receiving host needs to put these pieces back together in the correct order to make sense of the data.

Submit
18. Refer to the exhibit. In this VLSM addressing scheme, what summary address would be sent from router A? VLSM_summary.jpg

Explanation

Router A receives 3 subnets: 172.16.64.0/18, 172.16.32.0/24 and 172.16.128.0/18.

All these 3 subnets have the same form of 172.16.x.x so our summarized subnet must be also in that form -> Only A, B or C is correct.

The smallest subnet mask of these 3 subnets is /18 so our summarized subnet must also have its subnet mask equal or smaller than /18.

-> Only answer A has these 2 conditions -> A is correct.

Submit
19. Subnet the Class B IP Address 130.13.0.0 into 500 Subnets.  What is the new Subnet Mask and what is the Increment?

Explanation

130.13.0.0 Need 500 Networks

128 64 32 16 8 4 2 1 . 128 64 32 16 8 4 2 1

0 0 0 0 0 0 0 1 . 1 1 1 1 0 1 0 0 = 500 in binary
Need to borrow 9 bits for # of Networks

New Subnet Mask = 255.255.11111111.10000000 (255.128) or /25
^ Increment = 128

2^9 = # of Networks = 512
2^7-2 = # of Hosts per Network = 126

First 5 IP Ranges
130.13.0.0 - 130.13.0.127
13.0.128 – 13.0.255
13.1.0 – 13.1.127
13.1.128 – 13.1.255
13.2.0 – 13.2.127

Submit
20. Consists of a radio transmitter capable of connecting end devices wirelessly

Explanation

A wireless access point is a device that enables end devices to connect to a wireless network. It consists of a radio transmitter that can establish a wireless connection with these devices. This device acts as a bridge between the wired and wireless network, allowing devices to access the internet or other resources without the need for physical connections. Therefore, a wireless access point is the correct answer as it accurately describes a device with a radio transmitter capable of connecting end devices wirelessly.

Submit
21. Which of the following describes the operation of TCP window size?

Explanation

The TCP window size refers to the amount of data that can be sent without receiving an acknowledgment from the receiver. When packets are lost, the TCP window size is decreased to prevent further congestion and ensure reliable transmission. This allows the sender to adjust the rate at which data is sent based on the network conditions and the receiver's ability to handle the data. Therefore, the statement "Window size is decreased if packets are lost" accurately describes the operation of TCP window size.

Submit
22. Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?

Explanation

The distribution layer in a hierarchical design model controls the flow of network traffic using policies and performs routing functions between virtual LANs (VLANs). This layer helps to segment the network into different broadcast domains and provides connectivity between different access layer switches. It also acts as an aggregation point for multiple access layer switches and connects them to the core layer. By separating the traffic and enforcing policies, the distribution layer ensures efficient and secure communication within the network.

Submit
23. Link aggregation should be implemented at which layer of the hierarchical network?

Explanation

Link aggregation should be implemented at the access, distribution, and core layers of the hierarchical network. This is because link aggregation, also known as link bundling or port trunking, allows multiple physical links to be combined into a single logical link. By implementing link aggregation at all three layers, the network can achieve increased bandwidth, improved redundancy, and better load balancing across multiple links. This helps in optimizing network performance and ensuring high availability of network resources throughout the entire hierarchical network.

Submit
24. What are three benefits of a hierarchical network model? (Choose three.)

Explanation

The hierarchical network model provides three main benefits. Firstly, it reduces contention for bandwidth by dividing the network into different layers or levels, ensuring that traffic is distributed efficiently and congestion is minimized. Secondly, it increases fault tolerance of the network by allowing for redundancy and multiple paths, ensuring that if one part of the network fails, the rest can still function. Lastly, it simplifies management and troubleshooting by organizing the network into distinct layers, making it easier to identify and resolve issues within specific areas rather than the entire network.

Submit
25. Subnet the Address 150.20.0.0 into networks supporting 500 Hosts each.  What is the New Subnet Mask and the IP Address Range of the first Network.

Explanation

150.20.0.0 Need 500 Hosts per Network

128 64 32 16 8 4 2 1 . 128 64 32 16 8 4 2 1

0 0 0 0 0 0 0 1 . 1 1 1 1 0 1 0 0 = 500 in binary
Need to save 9 bits for # of Hosts

New Subnet Mask = 255.255.11111110.00000000 (254.0) or /23
^ Increment = 2 in the 3rd Octet

2^7 = # of Networks = 128
2^9-2 = # of Hosts per Network = 510

First 5 IP Ranges
150.20.0.0 - 150.20.1.255
20.2.0 – 20.3.255
20.4.0 – 20.5.255
20.6.0 – 20.7.255
20.8.0 – 20.9.255

Submit
26. Secures outgoing traffic and restricts incoming traffic

Explanation

A firewall appliance is a device that is used to secure a network by controlling and monitoring incoming and outgoing traffic. It acts as a barrier between the internal network and the external network, allowing only authorized traffic to pass through while blocking any unauthorized or potentially harmful traffic. By doing so, it helps protect the network from external threats and ensures that outgoing traffic is secure.

Submit
27. Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three) VLAN_IP_Assignment.jpg

Explanation

VLAN 2 has 114 hosts so we need to leave 7 bits 0 for the host addresses (27 – 2 = 126 > 114). Notice that we are working with class B (both Host A and Host B belong to class B) and the default subnet mask of class B is /16 so we need to use 16 – 7 = 9 bits 1 for the sub-network mask, that means the subnet mask should be 255.255.255.128 -> B is correct.

By using above scheme, C is correct because the IP 172.16.1.25 belongs to the sub-network of VLAN 1 (172.16.1.0/25) and can be assigned to hosts in VLAN 1.

For communication between VLAN 1 and VLAN 2, the LAN interface of the router should be divided into multiple sub-interfaces with multiple IP addresses -> F is correct.

Submit
28. Match the following More descriptions of the physical layer are provided in the table. Drag each physical layer term to its description.
Submit
29. Which two features are supported at all three levels of the Cisco three-layer hierarchical model? (Choose two.)

Explanation

At all three levels of the Cisco three-layer hierarchical model, Power over Ethernet (PoE) is supported. PoE allows for the transmission of electrical power alongside data over Ethernet cables, eliminating the need for separate power cables. This feature is useful for powering devices such as IP phones, wireless access points, and IP cameras. Quality of Service (QoS) is also supported at all three levels. QoS allows for the prioritization and management of network traffic, ensuring that critical data, such as voice and video, receive higher priority and better performance. Link aggregation, which combines multiple physical links into a single logical link, is the third feature supported at all three levels. This improves bandwidth and provides redundancy.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 12, 2014
    Quiz Created by
    Bongeagle
Cancel
  • All
    All (29)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
There are ______ bits in an octet?
Unicast is considered a one to one type of communication ?
Which port number is used by SMTP?
What is the broadcast address for the network in which...
Is the transport protocol that manages the individual conversations...
What is the net ID for the network in which 192.168.242.5/20 is...
Which layer of the OSI model does an access layer LAN switch use to...
Which layer of the hierarchical design model provides a means of...
 
Configuring communication between devices on different VLANs requires...
What is the purpose of TCP/UDP port numbers ?
End system use port numbers to select the proper applications. What is...
You are given the IP Address of 193.103.20.0 /24 and need 50...
Is responsible for taking the formatted segments from TCP,...
Which layer of the hierarchical network design model is referred to as...
During data transfer, what is the receiving host responsible for ?...
Refer to the exhibit. In this VLSM addressing scheme, what summary...
Subnet the Class B IP Address 130.13.0.0 into 500 Subnets.  What...
Consists of a radio transmitter capable of connecting end devices...
Which of the following describes the operation of TCP window size?
Which hierarchical design model layer controls the flow of network...
Link aggregation should be implemented at which layer of the...
What are three benefits of a hierarchical network model? (Choose...
Subnet the Address 150.20.0.0 into networks supporting 500 Hosts...
Secures outgoing traffic and restricts incoming traffic
Refer to the diagram. All hosts have connectivity with one another....
Match the following ...
Which two features are supported at all three levels of the Cisco...
Alert!

Advertisement