Computer Networking Quiz: Ultimate Exam

20 Questions | Total Attempts: 275

SettingsSettingsSettings
Computer Networking Quiz: Ultimate Exam - Quiz

.


Questions and Answers
  • 1. 
    "IEEE 802.3" refers to what collection of network standards?
    • A. 

      Token Ring

    • B. 

      Wireless

    • C. 

      HomePNA

    • D. 

      Ethernet

  • 2. 
    What is the official TCP port for an outgoing email from an end user's email client?
    • A. 

      25

    • B. 

      587

    • C. 

      80

    • D. 

      110

  • 3. 
    What is the port number used by SSL?
    • A. 

      445

    • B. 

      543

    • C. 

      443

    • D. 

      553

  • 4. 
    What is the "Reverse DNS Lookup" used for?
    • A. 

      Convert IP Address To The Host Name

    • B. 

      Convert The Host Name To IP Address

    • C. 

      Convert MAC Address To IP Address

    • D. 

      Convert IP Address To MAC Address

  • 5. 
    What is the maximum data rate for CAT 5 twisted pair cable?
    • A. 

      100 Mbps

    • B. 

      1000 Mbps

    • C. 

      1 Mbps

    • D. 

      10 Mbps

  • 6. 
    What is the name of the self-maintaining routing protocol for wireless networks?
    • A. 

      SDR

    • B. 

      RSD

    • C. 

      DSR

    • D. 

      DRS

  • 7. 
    What is the name of a packet sent out from a router to establish network adjacency relationships?
    • A. 

      HELLO

    • B. 

      ALOHA

    • C. 

      HEY

    • D. 

      HELO

  • 8. 
    What class of the network is reserved and not used?
    • A. 

      Class D

    • B. 

      Class E

    • C. 

      Class F

    • D. 

      Class C

  • 9. 
    What is the size of the biggest ICMP packet possible?
    • A. 

      76 Bytes

    • B. 

      94 Bytes

    • C. 

      108 Bytes

    • D. 

      62 Bytes

  • 10. 
    What is an FTP connection which does not require authentication called?
    • A. 

      Authless

    • B. 

      Secure

    • C. 

      Anonymous

    • D. 

      Insecure

  • 11. 
    What networking term defines an attack that takes advantage of a vulnerability?
    • A. 

      DDoS

    • B. 

      Exploit

    • C. 

      DoS

    • D. 

      Trojan

  • 12. 
    Which Ethernet standard uses thick RG8 coaxial cable with an AUI connector?
    • A. 

      10baset

    • B. 

      10base2

    • C. 

      10base5

    • D. 

      100baset

  • 13. 
    What type of twisted pair can transmit data at 10 Mbps or faster?
    • A. 

      Only Category 3

    • B. 

      Categories 1 And 3

    • C. 

      Categories 1, 2, 5

    • D. 

      Categories 3, 4, 5

  • 14. 
    Which layer of the OSI model does a NIC fall under?
    • A. 

      Session

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Physical

  • 15. 
    What is the first field in the header of a TCP segment?
    • A. 

      Checksum

    • B. 

      Source Port

    • C. 

      Destination Port

    • D. 

      Urgent Pointer

  • 16. 
    What company was the first to patent ethernet technology?
    • A. 

      Xerox

    • B. 

      Cisco

    • C. 

      Wang

    • D. 

      IBM

  • 17. 
    What the first version number of HTTP (Hyper Text Transfer Protocol)?
    • A. 

      0.5

    • B. 

      1

    • C. 

      0.1

    • D. 

      0.9

  • 18. 
    What is the size of UDP header?
    • A. 

      32 Bytes

    • B. 

      16 Bytes

    • C. 

      64 Bytes

    • D. 

      8 Bytes

  • 19. 
    What is the size of TCP header?
    • A. 

      10 Bytes

    • B. 

      20 Bytes

    • C. 

      5 Bytes

    • D. 

      15 Bytes

  • 20. 
    What is the size of a standard IP address?
    • A. 

      4 Bits

    • B. 

      16 Bits

    • C. 

      8 Bits

    • D. 

      32 Bits

Back to Top Back to top