Microsoft Configuration Chapter 5 Test Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tiffshirk
T
Tiffshirk
Community Contributor
Quizzes Created: 5 | Total Attempts: 1,139
Questions: 24 | Attempts: 49

SettingsSettingsSettings
Microsoft Configuration Chapter 5 Test Questions - Quiz


This is your description.


Questions and Answers
  • 1. 

    __________ are the rules or languages in which networking is possible

    • A.

      Protocols

    • B.

      Electrical Signaling

    • C.

      Topologies

    • D.

      Connectors

    Correct Answer
    A. Protocols
    Explanation
    Protocols are the set of rules or languages that enable networking. They define the format, timing, and sequencing of data transmission between devices in a network. Protocols ensure that data is transmitted accurately and efficiently, allowing devices to communicate and exchange information. Without protocols, networking would not be possible as there would be no standardized way for devices to interact with each other. Therefore, protocols are essential for establishing and maintaining effective communication within a network.

    Rate this question:

  • 2. 

    What type of connector does unshielded twisted pair (UTP) cable use

    • A.

      RJ11

    • B.

      RJ45

    • C.

      RG58

    • D.

      RG59

    Correct Answer
    B. RJ45
    Explanation
    The correct answer is RJ45. RJ45 is the type of connector used for unshielded twisted pair (UTP) cable. UTP cables are commonly used in Ethernet networking for transmitting data. The RJ45 connector has eight pins and is designed to fit into an RJ45 socket, which is found on most network devices such as routers, switches, and computers. This connector is widely used for connecting devices in local area networks (LANs) and is the standard connector for Ethernet connections.

    Rate this question:

  • 3. 

    Which layer of the OSI model covers the cabling and electrical signaling?

    • A.

      Physical

    • B.

      Data-link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    A. Physical
    Explanation
    The correct answer is Physical. The Physical layer of the OSI model is responsible for the physical transmission of data, including the cabling and electrical signaling. It deals with the physical aspects of the network, such as the type of cables used, the connectors, and the electrical voltages used for transmission. This layer ensures that the data is transmitted reliably and efficiently over the network.

    Rate this question:

  • 4. 

    What layer of the OSI model are the Media Access Control address part of?

    • A.

      Physical

    • B.

      Data-link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    B. Data-link
    Explanation
    The Media Access Control (MAC) address is a unique identifier assigned to network interfaces for communications on the data-link layer of the OSI model. This layer is responsible for the reliable transfer of data between network nodes over a physical medium. The MAC address is used to identify devices within a local network and is essential for the proper functioning of protocols like Ethernet. Therefore, the correct answer is Data-link.

    Rate this question:

  • 5. 

    What is the primary protocol used by Windows to communicate over a network?

    • A.

      TCP/IP

    • B.

      IPX/SPX

    • C.

      DLC

    • D.

      SNA

    Correct Answer
    A. TCP/IP
    Explanation
    TCP/IP is the primary protocol used by Windows to communicate over a network. TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a set of rules that governs how data is transmitted over the internet. It is the most widely used protocol for network communication as it provides reliable and efficient data transmission. TCP/IP is used for various purposes such as web browsing, email, file transfer, and remote access. It ensures that data packets are delivered accurately and in the correct order, making it essential for network communication in Windows systems.

    Rate this question:

  • 6. 

    On which layer of the OSI model is IPv4 Addressing included?

    • A.

      Physical

    • B.

      Data-link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    C. Network
    Explanation
    IPv4 addressing is included in the Network layer of the OSI model. The Network layer is responsible for logical addressing and routing of data packets across different networks. IPv4 addresses are used to uniquely identify devices on a network and enable communication between them. Therefore, it is appropriate for IPv4 addressing to be included in the Network layer of the OSI model.

    Rate this question:

  • 7. 

    What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier?

    • A.

      Default gateway

    • B.

      Subnet mask

    • C.

      MAC address

    • D.

      OSI model

    Correct Answer
    B. Subnet mask
    Explanation
    A subnet mask is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier. It is a 32-bit number that is used in conjunction with the IP address to determine the network and host portions of the address. The subnet mask is applied bitwise to the IP address, with the network portion of the address being determined by the bits that are set to 1 in the subnet mask. The host portion of the address is determined by the bits that are set to 0 in the subnet mask.

    Rate this question:

  • 8. 

    In what class is the address of 156.43.75.212?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    A. Class A
    Explanation
    The address 156.43.75.212 belongs to Class A because it falls within the range of 1.0.0.0 to 126.0.0.0. Class A addresses have the first octet as the network portion, and the remaining three octets as the host portion.

    Rate this question:

  • 9. 

    What is the default subnet mask for 198.54.65.3?

    • A.

      255.0.0.0

    • B.

      255.255.0.0

    • C.

      255.255.255.0

    • D.

      255.255.255.255

    Correct Answer
    C. 255.255.255.0
    Explanation
    The default subnet mask for the IP address 198.54.65.3 is 255.255.255.0. This subnet mask is used in a Class C network, where the first three octets (198.54.65) represent the network portion, and the last octet (3) represents the host portion. The subnet mask 255.255.255.0 indicates that the first three octets are used for the network, and the last octet is available for host addresses.

    Rate this question:

  • 10. 

    What is used to avoid assigning entire addresses of a particular class to networks that didn't have that many hosts?

    • A.

      IANA

    • B.

      NAT

    • C.

      CIDR

    • D.

      APIPA

    Correct Answer
    C. CIDR
    Explanation
    CIDR (Classless Inter-Domain Routing) is used to avoid assigning entire addresses of a particular class to networks that didn't have that many hosts. In traditional IP addressing, classes were used to allocate address space, but this led to inefficient use of addresses. CIDR was introduced to allow for more flexible allocation of IP addresses by allowing the use of variable-length subnet masks. This allows network administrators to allocate smaller blocks of addresses to networks based on their actual requirements, thus avoiding wastage of address space.

    Rate this question:

  • 11. 

    If you have an IPv4 address of 123.54.34.77 with a subnet mask of 255.255.240.0, what is the CIDR notation?  

    • A.

      /16

    • B.

      /20

    • C.

      /24

    • D.

      /28

    Correct Answer
    B. /20
    Explanation
    The given IPv4 address 123.54.34.77 with a subnet mask of 255.255.240.0 falls under the /20 CIDR notation. This is because the subnet mask 255.255.240.0 has 20 network bits and 12 host bits. The CIDR notation represents the number of network bits in the subnet mask, which in this case is 20.

    Rate this question:

  • 12. 

    Which of the following is NOT an IPv4 private address range?

    • A.

      10.0.0.0 through 10.255.255.255

    • B.

      172.16.0.0 through 172.31.255.255

    • C.

      192.168.0.0 through 192.168.255.255

    • D.

      224.0.0.0 through 224.255.255.255

    Correct Answer
    D. 224.0.0.0 through 224.255.255.255
    Explanation
    The given answer, 224.0.0.0 through 224.255.255.255, is not an IPv4 private address range. This range is reserved for multicast addresses, which are used for one-to-many communication. Private address ranges, on the other hand, are used for internal networks and are not routable on the internet. The correct IPv4 private address ranges are 10.0.0.0 through 10.255.255.255, 172.16.0.0 through 172.31.255.255, and 192.168.0.0 through 192.168.255.255.

    Rate this question:

  • 13. 

    What would a corporation use to allow private IPv4 addresses to communicate with the Internet?

    • A.

      DHCP

    • B.

      APIPA

    • C.

      MAC

    • D.

      NAT

    Correct Answer
    D. NAT
    Explanation
    A corporation would use NAT (Network Address Translation) to allow private IPv4 addresses to communicate with the Internet. NAT is a technique that allows multiple devices with private IP addresses to share a single public IP address when connecting to the Internet. It translates the private IP addresses to the public IP address and vice versa, enabling communication between the private network and the Internet. This helps conserve public IP addresses and provides an extra layer of security by hiding the internal network structure from external sources.

    Rate this question:

  • 14. 

    What address is assigned to a computer that fails to locate a DHCP server?

    • A.

      NAT

    • B.

      MAC

    • C.

      APIPA

    • D.

      CIDR

    Correct Answer
    C. APIPA
    Explanation
    When a computer fails to locate a DHCP server, it is unable to receive an IP address automatically. In such cases, the computer assigns itself an IP address using Automatic Private IP Addressing (APIPA). APIPA assigns a unique IP address from the range 169.254.0.1 to 169.254.255.254 to the computer. This allows the computer to communicate with other devices on the same network segment that are also using APIPA.

    Rate this question:

  • 15. 

    What server automatically assigns IP addresses?

    • A.

      NAT

    • B.

      DNS

    • C.

      DHCP

    • D.

      CIDR

    Correct Answer
    C. DHCP
    Explanation
    DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used by servers to automatically assign IP addresses to devices on a network. This protocol allows devices to obtain an IP address, subnet mask, default gateway, and other network configuration information without manual configuration. Therefore, DHCP is the server that automatically assigns IP addresses.

    Rate this question:

  • 16. 

    What type of address is the FCC0:0:0:0B5D:FF:BE3B:F4F7:3311?

    • A.

      MAC

    • B.

      IPV4

    • C.

      IPv6

    • D.

      WINS

    Correct Answer
    C. IPv6
    Explanation
    The given address "FCC0:0:0:0B5D:FF:BE3B:F4F7:3311" is in the format of an IPv6 address. IPv6 is the latest version of the Internet Protocol, which provides a much larger address space compared to IPv4. IPv6 addresses are represented using eight groups of four hexadecimal digits, separated by colons. In this case, the address consists of eight groups, each containing four hexadecimal digits. Therefore, the correct answer is IPv6.

    Rate this question:

  • 17. 

    Which type of address defines a single network interface in a computer or other device?

    • A.

      Unicast

    • B.

      Anycast

    • C.

      Multicast

    • D.

      Public

    Correct Answer
    A. Unicast
    Explanation
    A unicast address is used to define a single network interface in a computer or other device. This type of address is unique and identifies a specific device on a network. It allows for point-to-point communication between two devices, where data is sent from a source to a specific destination. Unlike multicast or anycast addresses, a unicast address is not shared or distributed among multiple devices.

    Rate this question:

  • 18. 

    Which type of IPv6 address is unique throughout the IPv6 universe?

    • A.

      Node-local

    • B.

      Link-local

    • C.

      Site-local

    • D.

      Global

    Correct Answer
    D. Global
    Explanation
    A global IPv6 address is unique throughout the entire IPv6 universe. Unlike node-local, link-local, and site-local addresses which have limited scopes, a global address can be used to identify a device globally on the internet. It allows communication between devices across different networks and ensures that each device has a unique address that can be reached from anywhere in the world.

    Rate this question:

  • 19. 

    What type of address mechanism is a tunneling protocol that enables computers to transmit IPv6 packets through NAT routers that do not support IPv6?

    • A.

      IPv4-compatible address

    • B.

      IPv4-mapped addresses

    • C.

      6to4

    • D.

      Teredo

    Correct Answer
    D. Teredo
    Explanation
    Teredo is a tunneling protocol that allows computers to transmit IPv6 packets through NAT routers that do not support IPv6. It encapsulates IPv6 packets within IPv4 packets, allowing them to traverse the IPv4 network. Teredo provides a way for IPv6 traffic to be transmitted over an IPv4 network, enabling communication between IPv6-enabled devices and devices that only support IPv4.

    Rate this question:

  • 20. 

    TCP is considered a __________ protocol.

    • A.

      Connection-oriented

    • B.

      Connectionless

    • C.

      Classful

    • D.

      Classless

    Correct Answer
    A. Connection-oriented
    Explanation
    TCP is considered a connection-oriented protocol because it establishes a reliable and ordered connection between two devices before data transmission. This means that TCP ensures that all data packets are received in the correct order and without any errors. It also provides flow control and congestion control mechanisms to optimize data transmission. This connection-oriented nature of TCP makes it suitable for applications that require reliable and accurate data delivery, such as web browsing, email, and file transfer.

    Rate this question:

  • 21. 

    What do you call codes that identify specific applications running on the system?

    • A.

      Ports

    • B.

      Protocol

    • C.

      TCP

    • D.

      UDP

    Correct Answer
    A. Ports
    Explanation
    Ports are codes that identify specific applications running on a system. These codes allow data to be sent and received between different applications on a network. Each application is assigned a unique port number, which helps in routing the data to the correct destination. By using ports, multiple applications can run simultaneously on a system without interference.

    Rate this question:

  • 22. 

    What utility or tool allows you to view and manage all your network connections?

    • A.

      Computer Managment console

    • B.

      Network and Sharing Center

    • C.

      Network Discovery console

    • D.

      Windows Firewall with Advanced Security

    Correct Answer
    B. Network and Sharing Center
    Explanation
    The Network and Sharing Center is a utility or tool in Windows that allows users to view and manage all their network connections. It provides a centralized location to access information about network connections, such as network status, network adapters, and sharing options. Users can also troubleshoot network problems, set up new connections, and modify network settings through this tool. It serves as a hub for managing and monitoring network connections on a computer.

    Rate this question:

  • 23. 

    What is a software routine that acts as a virtual barrier between a computer and the network to which it is attached?

    • A.

      Filter Watcher

    • B.

      Firewall

    • C.

      Protocol analyzer

    • D.

      SNMP

    Correct Answer
    B. Firewall
    Explanation
    A firewall is a software routine that acts as a virtual barrier between a computer and the network to which it is attached. It helps to monitor and control incoming and outgoing network traffic based on predetermined security rules. By filtering and blocking unauthorized access attempts, a firewall protects the computer and network from potential threats and malicious activities.

    Rate this question:

  • 24. 

    What command is used to test network connectivity between two hosts?

    • A.

      Ipconfig

    • B.

      Ping

    • C.

      Netsh

    • D.

      Nslookup

    Correct Answer
    B. Ping
    Explanation
    The correct answer is "Ping." The Ping command is used to test network connectivity between two hosts by sending an ICMP Echo Request message to the target host and waiting for an ICMP Echo Reply message. It measures the round-trip time for the message to reach the destination and come back. By receiving a response from the target host, it confirms that there is a network connection between the two hosts.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.