‘authenticate’ Your Networking Knowledge

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By SDMMagazine
S
SDMMagazine
Community Contributor
Quizzes Created: 19 | Total Attempts: 24,428
Questions: 15 | Attempts: 394

SettingsSettingsSettings
authenticate Your Networking Knowledge - Quiz

SDM Magazine 5-Minute Tech Quiz, November 2013


Questions and Answers
  • 1. 

    A MAC address is comprised of _____ sets of numbers that identify _____

    • A.

      4; the computer.

    • B.

      4; the manufacturer, ISP, transmission method, and device.

    • C.

      2; the manufacturer and the device.

    • D.

      1; the devices’ serial number.

    Correct Answer
    C. 2; the manufacturer and the device.
    Explanation
    Every device from the same manufacturer will have the same first set of numbers.

    Rate this question:

  • 2. 

    In programming a device, the number is created by activating switches representing numbers from

    • A.

      2 to 256.

    • B.

      1 to 128.

    • C.

      0 to 256.

    • D.

      1 to 999.

    Correct Answer
    B. 1 to 128.
    Explanation
    The correct answer is 1 to 128 because the question states that the number is created by activating switches representing numbers from 2 to 256. Since the switches represent numbers from 2 to 256, it implies that the number can range from 2 to 256. However, the given options only include ranges that start from 1, so the only option that fits the given information is 1 to 128.

    Rate this question:

  • 3. 

    Standards for networking are created by

    • A.

      ANSI.

    • B.

      NFPA.

    • C.

      IEEE.

    • D.

      ASIS.

    • E.

      UL.

    Correct Answer
    C. IEEE.
    Explanation
    IEEE, also known as the Institute of Electrical and Electronics Engineers, is responsible for creating standards in the field of networking. The organization develops and publishes various standards that are widely used in the industry, including those related to Ethernet, Wi-Fi, and other networking technologies. ANSI, NFPA, ASIS, and UL are also involved in creating standards, but they are not specifically focused on networking.

    Rate this question:

  • 4. 

    The seven-layer model defines how everything from hardware to software is supposed to work in a network.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because the seven-layer model, also known as the OSI model, is a conceptual framework that describes the functions of a network system. It breaks down the network communication process into seven layers, each responsible for specific tasks. These layers include physical, data link, network, transport, session, presentation, and application layers. By defining how hardware and software should work together, the seven-layer model provides a standardized approach for network communication and interoperability.

    Rate this question:

  • 5. 

    The lower levels of the OSI networking model are _____ protocols, and the upper levels deal primarily with _____

    • A.

      Lower-number octets; higher-number octets above 255.

    • B.

      Hardware-centric; software.

    • C.

      ISP; internal addressing.

    • D.

      Security; authentication.

    Correct Answer
    B. Hardware-centric; software.
    Explanation
    The lower levels of the OSI networking model are hardware-centric protocols, meaning they focus on the physical aspects of networking such as electrical signals and data transmission. On the other hand, the upper levels deal primarily with software, which includes tasks like data formatting, encryption, and error detection. This division between hardware-centric and software functions helps to ensure that the networking model operates efficiently and effectively.

    Rate this question:

  • 6. 

    An IP address consists of _____ sets of numbers.

    • A.

      2

    • B.

      4

    • C.

      6

    • D.

      8

    Correct Answer
    B. 4
    Explanation
    Four sets of numbers separated by a period.

    Rate this question:

  • 7. 

    The purchaser of the network device must program the MAC address into the device prior to activating it.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the MAC address is a unique identifier assigned to a network device by the manufacturer. It is not something that the purchaser can program into the device. The MAC address is already programmed into the device when it is manufactured and cannot be changed by the purchaser.

    Rate this question:

  • 8. 

    Which of the following is not a type of protocol?

    • A.

      TCP

    • B.

      UDP

    • C.

      RSP

    • D.

      IP

    • E.

      DHCP

    Correct Answer
    C. RSP
    Explanation
    RSP is not a type of protocol. TCP (Transmission Control Protocol), UDP (User Datagram Protocol), IP (Internet Protocol), and DHCP (Dynamic Host Configuration Protocol) are all well-known protocols used in computer networks. However, RSP is not a recognized protocol and therefore is not a correct answer to the question.

    Rate this question:

  • 9. 

    A MAC address is _____ bits long, written as _____ pairs of hexadecimal digits.

    • A.

      8; 24

    • B.

      8; 24

    • C.

      4; 15

    • D.

      255; 8

    Correct Answer
    B. 8; 24
    Explanation
    8 bits x 6 groups = 48, 6 groups hexadecimal = 0-F

    Rate this question:

  • 10. 

    An IP address is _____ bits long and written as _____ numbers in a “dotted-decimal-notation” format.

    • A.

      32; 4

    • B.

      16; 6

    • C.

      128; 8

    • D.

      255; 8

    Correct Answer
    A. 32; 4
    Explanation
    An IP address is 32 bits long and written as 4 numbers in a "dotted-decimal-notation" format. This means that the IP address is divided into 4 sections, with each section representing 8 bits. Each section is separated by a period, creating the dotted-decimal-notation format. The 32-bit length allows for a large number of unique IP addresses to be created, which is necessary for the vast number of devices connected to the internet.

    Rate this question:

  • 11. 

    MAC addresses are used for network routing.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    MAC addresses, also known as Media Access Control addresses, are used for identifying network devices at the data link layer of the network protocol stack. They are not directly used for network routing, which is typically done using IP addresses at the network layer. MAC addresses are used for local communication within a network segment, while IP addresses are used for routing packets across different networks. Therefore, the statement that MAC addresses are used for network routing is false.

    Rate this question:

  • 12. 

    IP addresses are assigned to the computer by the _____ as a static address or automatically using _____.

    • A.

      Manufacturer; random number generation

    • B.

      Network administration; DHCP

    • C.

      ISP; the serial number

    • D.

      Any of the above

    • E.

      None of the above

    Correct Answer
    B. Network administration; DHCP
    Explanation
    IP addresses are assigned to the computer by network administration using DHCP. DHCP stands for Dynamic Host Configuration Protocol, which is a network protocol that allows network administrators to allocate and manage IP addresses dynamically. This means that the IP addresses can be assigned automatically to computers on the network, making it easier for network administrators to manage and configure IP addresses without manually assigning static addresses.

    Rate this question:

  • 13. 

    A NAT is

    • A.

      The National Addressing Team.

    • B.

      A bug.

    • C.

      The National Assignment Transmitter.

    • D.

      The Network Address Translator.

    Correct Answer
    D. The Network Address Translator.
    Explanation
    A Network Address Translator allows you to have a single IP address assigned to your LAN by your ISP, but it allows many hosts within the network to access the Internet.

    Rate this question:

  • 14. 

    A(n) _____ has a(n) _____ address programmed into it when manufactured.

    • A.

      IP; NAT

    • B.

      NIC; DNS

    • C.

      NAT; TCP

    • D.

      NIC; MAC

    Correct Answer
    D. NIC; MAC
    Explanation
    A NIC (Network Interface Card) has a MAC (Media Access Control) address programmed into it when manufactured. The MAC address is a unique identifier assigned to the NIC, which allows it to communicate with other devices on the network.

    Rate this question:

  • 15. 

    SSL authentication is a two-way communication method.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    SSL authentication is not a two-way communication method. It is a one-way communication method where the client verifies the authenticity of the server through a digital certificate. The server does not authenticate the client in this process. Therefore, the correct answer is False.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 15, 2013
    Quiz Created by
    SDMMagazine
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.