Computer Networking Quiz: Ultimate Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cambronbill3
C
Cambronbill3
Community Contributor
Quizzes Created: 2463 | Total Attempts: 1,070,071
Questions: 20 | Attempts: 376

SettingsSettingsSettings
Computer Networking Quiz: Ultimate Exam - Quiz

.


Questions and Answers
  • 1. 

    "IEEE 802.3" refers to what collection of network standards?

    • A.

      Token Ring

    • B.

      Wireless

    • C.

      HomePNA

    • D.

      Ethernet

    Correct Answer
    D. Ethernet
    Explanation
    IEEE 802.3 refers to the collection of network standards known as Ethernet. Ethernet is a widely used technology for local area networks (LANs) that allows devices to communicate with each other over a wired connection. The IEEE 802.3 standards define the specifications for the physical and data link layers of Ethernet networks, including the protocols and technologies used for transmitting data packets. Ethernet has evolved over time, with different versions and speeds, but it remains a fundamental and widely adopted networking standard.

    Rate this question:

  • 2. 

    What is the official TCP port for an outgoing email from an end user's email client?

    • A.

      25

    • B.

      587

    • C.

      80

    • D.

      110

    Correct Answer
    B. 587
    Explanation
    The official TCP port for an outgoing email from an end user's email client is 587. This port is specifically designated for email message submission, allowing end users to send emails through their email client to the email server. Port 587 is commonly used when the email client is configured to use the SMTP (Simple Mail Transfer Protocol) protocol with TLS (Transport Layer Security) encryption for secure email transmission.

    Rate this question:

  • 3. 

    What is the port number used by SSL?

    • A.

      445

    • B.

      543

    • C.

      443

    • D.

      553

    Correct Answer
    C. 443
    Explanation
    SSL (Secure Sockets Layer) is a protocol that provides secure communication over the internet. It uses port number 443 to establish a secure connection between a client and a server. This port is designated specifically for HTTPS (HTTP over SSL) traffic. Therefore, the correct answer is 443.

    Rate this question:

  • 4. 

    What is the "Reverse DNS Lookup" used for?

    • A.

      Convert IP Address To The Host Name

    • B.

      Convert The Host Name To IP Address

    • C.

      Convert MAC Address To IP Address

    • D.

      Convert IP Address To MAC Address

    Correct Answer
    A. Convert IP Address To The Host Name
    Explanation
    Reverse DNS Lookup is used to convert an IP address to the corresponding host name. This process allows users to identify the domain name associated with a specific IP address. This is particularly useful in network troubleshooting, security analysis, and spam filtering, as it provides information about the origin and ownership of an IP address. By performing a Reverse DNS Lookup, users can gain insights into the identity and location of a server or device connected to a specific IP address.

    Rate this question:

  • 5. 

    What is the maximum data rate for CAT 5 twisted pair cable?

    • A.

      100 Mbps

    • B.

      1000 Mbps

    • C.

      1 Mbps

    • D.

      10 Mbps

    Correct Answer
    B. 1000 Mbps
    Explanation
    The maximum data rate for CAT 5 twisted pair cable is 1000 Mbps. CAT 5 cable is capable of transmitting data at speeds up to 1000 Mbps, making it suitable for high-speed Ethernet networks. This type of cable is commonly used for internet connections, local area networks (LANs), and other data transmission applications.

    Rate this question:

  • 6. 

    What is the name of the self-maintaining routing protocol for wireless networks?

    • A.

      SDR

    • B.

      RSD

    • C.

      DSR

    • D.

      DRS

    Correct Answer
    C. DSR
    Explanation
    DSR stands for Dynamic Source Routing, which is a self-maintaining routing protocol for wireless networks. It allows nodes in a network to dynamically discover and maintain routes to other nodes in the network. With DSR, each packet carries the complete route information, eliminating the need for a centralized routing table. This protocol is commonly used in ad hoc wireless networks, where nodes can join or leave the network at any time.

    Rate this question:

  • 7. 

    What is the name of a packet sent out from a router to establish network adjacency relationships?

    • A.

      HELLO

    • B.

      ALOHA

    • C.

      HEY

    • D.

      HELO

    Correct Answer
    A. HELLO
    Explanation
    The correct answer is "HELLO". In networking, a "HELLO" packet is sent out from a router to establish network adjacency relationships. This packet is used to discover and establish connections with neighboring routers in order to exchange routing information and maintain network connectivity.

    Rate this question:

  • 8. 

    What class of the network is reserved and not used?

    • A.

      Class D

    • B.

      Class E

    • C.

      Class F

    • D.

      Class C

    Correct Answer
    B. Class E
    Explanation
    Class E is the correct answer because it is a reserved class of network addresses that are not used for normal network operations. Class E addresses range from 240.0.0.0 to 255.255.255.255 and are reserved for future use or experimental purposes. These addresses are not assigned to any specific organization or used in the current internet infrastructure.

    Rate this question:

  • 9. 

    What is the size of the biggest ICMP packet possible?

    • A.

      76 Bytes

    • B.

      94 Bytes

    • C.

      108 Bytes

    • D.

      62 Bytes

    Correct Answer
    A. 76 Bytes
    Explanation
    The correct answer is 76 Bytes because the maximum size of an ICMP packet, including the header, is 76 bytes. ICMP (Internet Control Message Protocol) is a network protocol used for diagnostic and error reporting purposes in IP networks. The maximum size of an ICMP packet is determined by the maximum size of the IP packet, which is 65,535 bytes, minus the size of the IP and ICMP headers. Therefore, the largest ICMP packet possible is 76 bytes.

    Rate this question:

  • 10. 

    What is an FTP connection which does not require authentication called?

    • A.

      Authless

    • B.

      Secure

    • C.

      Anonymous

    • D.

      Insecure

    Correct Answer
    C. Anonymous
    Explanation
    An FTP connection which does not require authentication is called "Anonymous". This means that anyone can connect to the FTP server without providing any credentials or authentication. It is commonly used for public file sharing or downloading files from public repositories.

    Rate this question:

  • 11. 

    What networking term defines an attack that takes advantage of a vulnerability?

    • A.

      DDoS

    • B.

      Exploit

    • C.

      DoS

    • D.

      Trojan

    Correct Answer
    B. Exploit
    Explanation
    An exploit is a term used in networking to define an attack that takes advantage of a vulnerability. It refers to the act of using a weakness or flaw in a system or software to gain unauthorized access, cause damage, or extract sensitive information. Exploits can be used to launch various types of attacks, such as gaining control over a system, executing malicious code, or bypassing security measures. Unlike DDoS (Distributed Denial of Service), DoS (Denial of Service), and Trojan, which are different types of attacks, an exploit specifically refers to the method used to carry out an attack.

    Rate this question:

  • 12. 

    Which Ethernet standard uses thick RG8 coaxial cable with an AUI connector?

    • A.

      10baset

    • B.

      10base2

    • C.

      10base5

    • D.

      100baset

    Correct Answer
    C. 10base5
    Explanation
    10base5 is the correct answer because it is the Ethernet standard that uses thick RG8 coaxial cable with an AUI connector. This standard, also known as Thicknet or Thick Ethernet, supports a maximum data transfer rate of 10 Mbps and uses a thick coaxial cable for transmission. The AUI (Attachment Unit Interface) connector is used to connect the thick coaxial cable to the network interface card (NIC) of a device.

    Rate this question:

  • 13. 

    What type of twisted pair can transmit data at 10 Mbps or faster?

    • A.

      Only Category 3

    • B.

      Categories 1 And 3

    • C.

      Categories 1, 2, 5

    • D.

      Categories 3, 4, 5

    Correct Answer
    D. Categories 3, 4, 5
    Explanation
    Categories 3, 4, and 5 twisted pair cables can transmit data at 10 Mbps or faster. This is because these categories of cables have higher bandwidth capabilities compared to lower categories like Category 1 and 2. Category 3 cables can support data transmission up to 10 Mbps, while Category 4 and 5 cables can support even higher speeds. Therefore, the correct answer is Categories 3, 4, 5.

    Rate this question:

  • 14. 

    Which layer of the OSI model does a NIC fall under?

    • A.

      Session

    • B.

      Data Link

    • C.

      Network

    • D.

      Physical

    Correct Answer
    B. Data Link
    Explanation
    A NIC (Network Interface Card) falls under the Data Link layer of the OSI model. This layer is responsible for the reliable transmission of data between two nodes on a network. The NIC handles the physical connection to the network and also performs functions such as framing, error detection, and MAC address assignment. Therefore, the Data Link layer is the correct layer in which a NIC operates.

    Rate this question:

  • 15. 

    What is the first field in the header of a TCP segment?

    • A.

      Checksum

    • B.

      Source Port

    • C.

      Destination Port

    • D.

      Urgent Pointer

    Correct Answer
    B. Source Port
    Explanation
    The first field in the header of a TCP segment is the Source Port. This field identifies the port number of the sender's application or process. It is used to establish a connection between the sender and the receiver, allowing them to communicate effectively. The Source Port is crucial in the TCP header as it helps in the proper routing and delivery of the data packets.

    Rate this question:

  • 16. 

    What company was the first to patent ethernet technology?

    • A.

      Xerox

    • B.

      Cisco

    • C.

      Wang

    • D.

      IBM

    Correct Answer
    A. Xerox
    Explanation
    Xerox was the first company to patent Ethernet technology. Ethernet is a widely used networking technology that enables devices to communicate with each other within a local area network (LAN). Xerox's invention of Ethernet in the 1970s revolutionized computer networking and laid the foundation for the modern internet. Their patent on Ethernet technology allowed them to establish their dominance in the networking industry and paved the way for further advancements in networking technology.

    Rate this question:

  • 17. 

    What the first version number of HTTP (Hyper Text Transfer Protocol)?

    • A.

      0.5

    • B.

      1

    • C.

      0.1

    • D.

      0.9

    Correct Answer
    D. 0.9
    Explanation
    The first version number of HTTP is 0.9. This version was a simple protocol that allowed for the transfer of hypertext documents between a client and a server. It only supported GET requests and did not have headers or status codes. This version was later replaced by HTTP 1.0, which introduced more features and improvements to the protocol.

    Rate this question:

  • 18. 

    What is the size of UDP header?

    • A.

      32 Bytes

    • B.

      16 Bytes

    • C.

      64 Bytes

    • D.

      8 Bytes

    Correct Answer
    D. 8 Bytes
    Explanation
    The size of the UDP header is 8 bytes.

    Rate this question:

  • 19. 

    What is the size of TCP header?

    • A.

      10 Bytes

    • B.

      20 Bytes

    • C.

      5 Bytes

    • D.

      15 Bytes

    Correct Answer
    B. 20 Bytes
    Explanation
    The size of the TCP header is 20 Bytes. The TCP (Transmission Control Protocol) header is a part of the TCP segment and contains important information such as source and destination port numbers, sequence and acknowledgment numbers, and control flags. The TCP header is fixed in size and always consists of 20 Bytes. This fixed size allows for efficient processing and interpretation of the TCP segment by network devices and applications.

    Rate this question:

  • 20. 

    What is the size of a standard IP address?

    • A.

      4 Bits

    • B.

      16 Bits

    • C.

      8 Bits

    • D.

      32 Bits

    Correct Answer
    D. 32 Bits
    Explanation
    An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The size of a standard IP address is 32 bits. This means that an IP address consists of four sets of 8 bits each, separated by periods. Each set can have a value ranging from 0 to 255, resulting in a total of 4,294,967,296 unique IP addresses.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Cambronbill3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.