Computer Networking Quiz: Ultimate Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cambronbill3
C
Cambronbill3
Community Contributor
Quizzes Created: 2461 | Total Attempts: 1,204,971
| Attempts: 432 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. "IEEE 802.3" refers to what collection of network standards?

Explanation

IEEE 802.3 refers to the collection of network standards known as Ethernet. Ethernet is a widely used technology for local area networks (LANs) that allows devices to communicate with each other over a wired connection. The IEEE 802.3 standards define the specifications for the physical and data link layers of Ethernet networks, including the protocols and technologies used for transmitting data packets. Ethernet has evolved over time, with different versions and speeds, but it remains a fundamental and widely adopted networking standard.

Submit
Please wait...
About This Quiz
Computer Networking Quiz: Ultimate Exam - Quiz

Dive into the 'Computer Networking Quiz: Ultimate Exam' to test and enhance your knowledge of key networking standards and protocols. This quiz covers Ethernet standards, TCP\/IP ports, and... see moreadvanced networking concepts, making it ideal for students and professionals aiming to assess their understanding of network infrastructure. see less

2. What is the name of a packet sent out from a router to establish network adjacency relationships?

Explanation

The correct answer is "HELLO". In networking, a "HELLO" packet is sent out from a router to establish network adjacency relationships. This packet is used to discover and establish connections with neighboring routers in order to exchange routing information and maintain network connectivity.

Submit
3. What is the port number used by SSL?

Explanation

SSL (Secure Sockets Layer) is a protocol that provides secure communication over the internet. It uses port number 443 to establish a secure connection between a client and a server. This port is designated specifically for HTTPS (HTTP over SSL) traffic. Therefore, the correct answer is 443.

Submit
4. What is the size of a standard IP address?

Explanation

An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The size of a standard IP address is 32 bits. This means that an IP address consists of four sets of 8 bits each, separated by periods. Each set can have a value ranging from 0 to 255, resulting in a total of 4,294,967,296 unique IP addresses.

Submit
5. What is the "Reverse DNS Lookup" used for?

Explanation

Reverse DNS Lookup is used to convert an IP address to the corresponding host name. This process allows users to identify the domain name associated with a specific IP address. This is particularly useful in network troubleshooting, security analysis, and spam filtering, as it provides information about the origin and ownership of an IP address. By performing a Reverse DNS Lookup, users can gain insights into the identity and location of a server or device connected to a specific IP address.

Submit
6. What is an FTP connection which does not require authentication called?

Explanation

An FTP connection which does not require authentication is called "Anonymous". This means that anyone can connect to the FTP server without providing any credentials or authentication. It is commonly used for public file sharing or downloading files from public repositories.

Submit
7. What networking term defines an attack that takes advantage of a vulnerability?

Explanation

An exploit is a term used in networking to define an attack that takes advantage of a vulnerability. It refers to the act of using a weakness or flaw in a system or software to gain unauthorized access, cause damage, or extract sensitive information. Exploits can be used to launch various types of attacks, such as gaining control over a system, executing malicious code, or bypassing security measures. Unlike DDoS (Distributed Denial of Service), DoS (Denial of Service), and Trojan, which are different types of attacks, an exploit specifically refers to the method used to carry out an attack.

Submit
8. What is the official TCP port for an outgoing email from an end user's email client?

Explanation

The official TCP port for an outgoing email from an end user's email client is 587. This port is specifically designated for email message submission, allowing end users to send emails through their email client to the email server. Port 587 is commonly used when the email client is configured to use the SMTP (Simple Mail Transfer Protocol) protocol with TLS (Transport Layer Security) encryption for secure email transmission.

Submit
9. What type of twisted pair can transmit data at 10 Mbps or faster?

Explanation

Categories 3, 4, and 5 twisted pair cables can transmit data at 10 Mbps or faster. This is because these categories of cables have higher bandwidth capabilities compared to lower categories like Category 1 and 2. Category 3 cables can support data transmission up to 10 Mbps, while Category 4 and 5 cables can support even higher speeds. Therefore, the correct answer is Categories 3, 4, 5.

Submit
10. What is the first field in the header of a TCP segment?

Explanation

The first field in the header of a TCP segment is the Source Port. This field identifies the port number of the sender's application or process. It is used to establish a connection between the sender and the receiver, allowing them to communicate effectively. The Source Port is crucial in the TCP header as it helps in the proper routing and delivery of the data packets.

Submit
11. What class of the network is reserved and not used?

Explanation

Class E is the correct answer because it is a reserved class of network addresses that are not used for normal network operations. Class E addresses range from 240.0.0.0 to 255.255.255.255 and are reserved for future use or experimental purposes. These addresses are not assigned to any specific organization or used in the current internet infrastructure.

Submit
12. What is the name of the self-maintaining routing protocol for wireless networks?

Explanation

DSR stands for Dynamic Source Routing, which is a self-maintaining routing protocol for wireless networks. It allows nodes in a network to dynamically discover and maintain routes to other nodes in the network. With DSR, each packet carries the complete route information, eliminating the need for a centralized routing table. This protocol is commonly used in ad hoc wireless networks, where nodes can join or leave the network at any time.

Submit
13. What is the maximum data rate for CAT 5 twisted pair cable?

Explanation

The maximum data rate for CAT 5 twisted pair cable is 1000 Mbps. CAT 5 cable is capable of transmitting data at speeds up to 1000 Mbps, making it suitable for high-speed Ethernet networks. This type of cable is commonly used for internet connections, local area networks (LANs), and other data transmission applications.

Submit
14. Which Ethernet standard uses thick RG8 coaxial cable with an AUI connector?

Explanation

10base5 is the correct answer because it is the Ethernet standard that uses thick RG8 coaxial cable with an AUI connector. This standard, also known as Thicknet or Thick Ethernet, supports a maximum data transfer rate of 10 Mbps and uses a thick coaxial cable for transmission. The AUI (Attachment Unit Interface) connector is used to connect the thick coaxial cable to the network interface card (NIC) of a device.

Submit
15. What is the size of TCP header?

Explanation

The size of the TCP header is 20 Bytes. The TCP (Transmission Control Protocol) header is a part of the TCP segment and contains important information such as source and destination port numbers, sequence and acknowledgment numbers, and control flags. The TCP header is fixed in size and always consists of 20 Bytes. This fixed size allows for efficient processing and interpretation of the TCP segment by network devices and applications.

Submit
16. Which layer of the OSI model does a NIC fall under?

Explanation

A NIC (Network Interface Card) falls under the Data Link layer of the OSI model. This layer is responsible for the reliable transmission of data between two nodes on a network. The NIC handles the physical connection to the network and also performs functions such as framing, error detection, and MAC address assignment. Therefore, the Data Link layer is the correct layer in which a NIC operates.

Submit
17. What company was the first to patent ethernet technology?

Explanation

Xerox was the first company to patent Ethernet technology. Ethernet is a widely used networking technology that enables devices to communicate with each other within a local area network (LAN). Xerox's invention of Ethernet in the 1970s revolutionized computer networking and laid the foundation for the modern internet. Their patent on Ethernet technology allowed them to establish their dominance in the networking industry and paved the way for further advancements in networking technology.

Submit
18. What the first version number of HTTP (Hyper Text Transfer Protocol)?

Explanation

The first version number of HTTP is 0.9. This version was a simple protocol that allowed for the transfer of hypertext documents between a client and a server. It only supported GET requests and did not have headers or status codes. This version was later replaced by HTTP 1.0, which introduced more features and improvements to the protocol.

Submit
19. What is the size of the biggest ICMP packet possible?

Explanation

The correct answer is 76 Bytes because the maximum size of an ICMP packet, including the header, is 76 bytes. ICMP (Internet Control Message Protocol) is a network protocol used for diagnostic and error reporting purposes in IP networks. The maximum size of an ICMP packet is determined by the maximum size of the IP packet, which is 65,535 bytes, minus the size of the IP and ICMP headers. Therefore, the largest ICMP packet possible is 76 bytes.

Submit
20. What is the size of UDP header?

Explanation

The size of the UDP header is 8 bytes.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Cambronbill3
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
"IEEE 802.3" refers to what collection of network standards?
What is the name of a packet sent out from a router to establish...
What is the port number used by SSL?
What is the size of a standard IP address?
What is the "Reverse DNS Lookup" used for?
What is an FTP connection which does not require authentication...
What networking term defines an attack that takes advantage of a...
What is the official TCP port for an outgoing email from an end...
What type of twisted pair can transmit data at 10 Mbps or faster?
What is the first field in the header of a TCP segment?
What class of the network is reserved and not used?
What is the name of the self-maintaining routing protocol for wireless...
What is the maximum data rate for CAT 5 twisted pair cable?
Which Ethernet standard uses thick RG8 coaxial cable with an AUI...
What is the size of TCP header?
Which layer of the OSI model does a NIC fall under?
What company was the first to patent ethernet technology?
What the first version number of HTTP (Hyper Text Transfer Protocol)?
What is the size of the biggest ICMP packet possible?
What is the size of UDP header?
Alert!

Advertisement