Quiz : How Well Do You Know About Advanced Networking?

29 Questions | Attempts: 1293
Share

SettingsSettingsSettings
Quiz : How Well Do You Know About Advanced Networking? - Quiz

. Just how well do you know about advanced networking? Advanced Networks are independent practice associations or integrated delivery system organizations that have entered into SSP arrangements with at least one payer. Why not take this quiz and test your knowledge? Please make sure to read all the questions carefully. All the questions in the quiz are designed to make you think and test your knowledge. Interestingly, the quiz can help you learn new things about the concept. There is no time limit on the quiz, so you can take it as many times as you like. Have fun!


Questions and Answers
  • 1. 
    Which port number is used by SMTP?
    • A. 

      20

    • B. 

      23

    • C. 

      25

    • D. 

      143

  • 2. 
    End system use port numbers to select the proper applications. What is the lowest port number that can be dynamically assigned by the host system?
    • A. 

      1

    • B. 

      128

    • C. 

      256

    • D. 

      1024

  • 3. 
    During data transfer, what is the receiving host responsible for ? Choose two
    • A. 

      Encapsulation

    • B. 

      Bandwidth

    • C. 

      Segmentation

    • D. 

      Acknowledgement

    • E. 

      Reassembly

  • 4. 
    Which of the following describes the operation of TCP window size?
    • A. 

      Window size increases as all data transfers.

    • B. 

      Window size is the TCP process used prepare data for transmission.

    • C. 

      Window size is decreased if packets are lost.

    • D. 

      Window size of 15 means that the next byte expected is byte number 15.

  • 5. 
    What is the purpose of TCP/UDP port numbers ?
    • A. 

      To indicate the beginning of a three-way handshake

    • B. 

      To reassemble the segments into the correct order

    • C. 

      To identify the numbers of the data packets that can be sent without acknowledgment

    • D. 

      To track the different conversations crossing the network at the same time

  • 6. 
    There are ______ bits in an octet?
    • A. 

      8

    • B. 

      5

    • C. 

      4

    • D. 

      9

  • 7. 
    Unicast is considered a one to one type of communication ?
    • A. 

      True

    • B. 

      False

  • 8. 
    What is the broadcast address for the network in which 192.168.242.5/20 is located?
    • A. 

      192.168.251.251

    • B. 

      192.168.250.250

    • C. 

      192.168.255.255

  • 9. 
    What is the net ID for the network in which 192.168.242.5/20 is located?
    • A. 

      192.168.241.1

    • B. 

      192.168.240.0

    • C. 

      192.168.242.2

  • 10. 
    You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets.  How many hosts per network, and total networks do you get once subnetted.
    • A. 

      20 Hosts and 50 Subnets

    • B. 

      2 Hosts and 64 Subnets

    • C. 

      4 Hosts and 50 Subnets

    • D. 

      6 Hosts and 64 Subnets

  • 11. 
    Subnet the Class B IP Address 130.13.0.0 into 500 Subnets.  What is the new Subnet Mask and what is the Increment?
    • A. 

      Subnet Mask 255.255.255.0 with an Increment of 2

    • B. 

      Subnet Mask 255.255.255.192 with an Increment of 128

    • C. 

      Subnet Mask 255.255.255.128 with an Increment of 128

    • D. 

      Subnet Mask 255.255.255.128 with an Increment of 64

  • 12. 
    Subnet the Address 150.20.0.0 into networks supporting 500 Hosts each.  What is the New Subnet Mask and the IP Address Range of the first Network.
    • A. 

      Subnet Mask 255.255.255.0, Range 150.20.0.0 - 150.20.0.255

    • B. 

      Subnet Mask 255.255.0.0, Range 150.20.0.0 - 150.20.1.255

    • C. 

      Subnet Mask 255.255.255.254, Range 150.20.0.0 - 150.20.255.255

    • D. 

      Subnet Mask 255.255.254.0, Range 150.20.0.0 - 150.20.1.255

  • 13. 
    Refer to the exhibit. In this VLSM addressing scheme, what summary address would be sent from router A?
    • A. 

      172.16.0.0/16

    • B. 

      172.16.0.0/20

    • C. 

      172.16.0.0/24

    • D. 

      172.32.0.0/16

  • 14. 
    Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three)
    • A. 

      The subnet mask in use is 255.255.255.192.

    • B. 

      The LAN interface of the router is configured with one IP address.

    • C. 

      The subnet mask in use is 255.255.255.128.

    • D. 

      The IP address 172.16.1.25 can be assigned to hosts in VLAN1.

    • E. 

      The LAN interface of the router is configured with multiple IP addresses.

  • 15. 
    Which layer of the hierarchical network design model is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?
    • A. 

      Access Layer

    • B. 

      Core Layer

    • C. 

      Data Link Layer

    • D. 

      Network Layer

  • 16. 
    Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?
    • A. 

      Application

    • B. 

      Access

    • C. 

      Distribution

    • D. 

      Core

  • 17. 
    Link aggregation should be implemented at which layer of the hierarchical network?
    • A. 

      Core only

    • B. 

      Distribution and core

    • C. 

      Access and distribution

    • D. 

      Access, distribution, and core

  • 18. 
     
    • A. 

      Scalability

    • B. 

      Security

    • C. 

      Redundancy

    • D. 

      Maintainability

  • 19. 
    Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?
    • A. 

      Application

    • B. 

      Access

    • C. 

      Distribution

    • D. 

      Network

  • 20. 
    • A. 

      Implement Layer 3 switching on S1 to reduce the packet processing load on D1 and D2. Install all security processing on S1 to reduce network traffic load.

    • B. 

      Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to limit access to the HR servers to just the HR subnet.

    • C. 

      Move all HR assets out of the data center and connect them to S1. Use Layer 3 security functions on S1 to deny all traffic into and out of S1.

    • D. 

      Perform all port access and Layer 3 security functions on C1.

  • 21. 
    Which two features are supported at all three levels of the Cisco three-layer hierarchical model? (Choose two.)
    • A. 

      Power over Ethernet

    • B. 

      Load balancing across redundant trunk links

    • C. 

      Redundant components

    • D. 

      Quality of Service

    • E. 

      Link aggregation

  • 22. 
    Configuring communication between devices on different VLANs requires the use of which layer of the OSI model?
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

    • E. 

      Layer 5

  • 23. 
    Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

  • 24. 
    What are three benefits of a hierarchical network model? (Choose three.)
    • A. 

      Reduced contention for bandwidth

    • B. 

      Reduced size of the physical layout

    • C. 

      Increased fault tolerance of the network

    • D. 

      Elimination of the need for layer three functionality

    • E. 

      Simplification of management and troubleshooting

  • 25. 
    Is the transport protocol that manages the individual conversations between web servers and web clients.
Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.