Do You Know About Computer Networking?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Attempts: 269 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. What flag is set in the first packet of a TCP three way handshake?

Explanation

In the first packet of a TCP three-way handshake, the SYN flag is set. The three-way handshake is a process used to establish a connection between two devices over a TCP/IP network. During this process, the initiating device sends a packet with the SYN flag set to the receiving device. This packet serves as a request to synchronize sequence numbers and initiate the connection. The receiving device then responds with a packet that has both the SYN and ACK flags set, indicating that it acknowledges the request and is willing to synchronize.

Submit
Please wait...
About This Quiz
Do You Know About Computer Networking? - Quiz

Sit back, relax and have fun with this Computer Networking quiz

2. What are the two sublayers of the data-link layer of the OSI model?

Explanation

The correct answer is MAC and LLC. The data-link layer of the OSI model is responsible for transferring data between adjacent network nodes. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical medium and addressing of devices on the network. The Logical Link Control (LLC) sublayer is responsible for error control, flow control, and framing of data. Together, MAC and LLC work together to ensure reliable and efficient data transmission within a local area network.

Submit
3. Signal degradation over a long cable run is called what?

Explanation

Attenuation refers to the loss of signal strength or quality over a long cable run. As the signal travels through the cable, it gradually weakens due to factors such as resistance, interference, and noise. This can result in a decrease in signal amplitude and clarity, leading to degraded transmission quality. Attenuation is a common issue in long-distance communication systems and can be mitigated through the use of signal amplifiers or by using higher quality cables.

Submit
4. Category 3 UTP cabling is rated for digital data transmission up to what speed?

Explanation

Category 3 UTP cabling is rated for digital data transmission up to 10 Mbps. This means that the maximum speed at which data can be transmitted through this type of cabling is 10 megabits per second.

Submit
5. Which of these is a common method of converting analog signals into digital?

Explanation

Pulse Code Modulation (PCM) is a common method of converting analog signals into digital. PCM involves sampling the analog signal at regular intervals and quantizing each sample into a discrete value. These discrete values are then represented as binary numbers, resulting in a digital representation of the original analog signal. PCM is widely used in telecommunications and audio applications for its ability to accurately reproduce analog signals in a digital format.

Submit
6. What TCP port number is usually assigned as the FTP "control port"?

Explanation

The correct answer is 21. This is because TCP port 21 is typically assigned as the FTP "control port". The control port is used for sending commands and receiving responses between the FTP client and server. It is responsible for establishing and managing the control connection during an FTP session.

Submit
7. BGP routing peers connect to each other via what TCP port number?

Explanation

BGP routing peers connect to each other via TCP port number 179. BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems on the internet. TCP (Transmission Control Protocol) is a reliable transport protocol that ensures the delivery of data packets. By using port number 179, BGP peers establish a TCP connection to exchange routing updates and maintain a consistent view of the network topology.

Submit
8. What network device restricts the expanse of a collision domain?

Explanation

A switch is a network device that restricts the expanse of a collision domain. Unlike a hub, which broadcasts data to all connected devices, a switch creates individual collision domains for each port. This means that data sent from one device to another will only be received by the intended recipient, reducing the chances of collisions and improving network performance. A CSU/DSU is used for connecting to a digital communication line, and a modem is used for connecting to an analog communication line, neither of which restrict the collision domain like a switch does.

Submit
9. Which of the following authentication protocols passes credentials in clear-text?

Explanation

PAP (Password Authentication Protocol) is the authentication protocol that passes credentials in clear-text. This means that the username and password are transmitted without any encryption, making it less secure compared to other protocols. This makes PAP vulnerable to eavesdropping and interception attacks, as the credentials can be easily captured and read by unauthorized individuals.

Submit
10. The AppleTalk protocol uses what access control method?

Explanation

The AppleTalk protocol uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) access control method. This method allows devices to sense the carrier (i.e., the medium) before transmitting data, and if the carrier is busy, they wait for a random period of time before attempting to transmit again. This helps to avoid collisions and ensures that data is transmitted reliably in a network using the AppleTalk protocol.

Submit
11. What Windows service provides NetBIOS name registration and resolution services?

Explanation

Windows Internet Name Services (WINS) is a Windows service that provides NetBIOS name registration and resolution services. NetBIOS is a networking protocol used by Windows systems to share resources and communicate with each other. WINS allows Windows systems to register their NetBIOS names and resolve the names of other systems on the network. It helps in translating NetBIOS names to IP addresses, enabling proper communication between Windows systems. Therefore, WINS is the correct answer for this question.

Submit
12. What type of DNS record is known as a "alias" record?

Explanation

A CNAME record, also known as an "alias" record, is a type of DNS record that is used to create an alias or nickname for another domain name. It allows multiple domain names to be associated with the same IP address, making it easier to manage and update DNS settings. This is useful when a website needs to be accessed using different domain names or subdomains.

Submit
13. What routing protocol allows Internet backbone routers to connect and share routes?

Explanation

Border Gateway Protocol (BGP) is the correct answer because it is the routing protocol used by internet backbone routers to connect and share routes. BGP is designed to exchange routing information between different autonomous systems (AS) on the internet. It allows routers in one AS to learn and advertise routes to routers in other ASs, making it essential for connecting and coordinating the routing across the internet backbone.

Submit
14. Which of the following protocols is "connectionless"?

Explanation

UDP (User Datagram Protocol) is a connectionless protocol because it does not establish a dedicated connection before sending data. It is a simple and lightweight protocol that operates at the transport layer of the Internet Protocol Suite. Unlike TCP, UDP does not guarantee the delivery or ordering of packets, making it faster but less reliable. UDP is commonly used for applications that require fast transmission of data, such as streaming media, online gaming, and DNS.

Submit
15. 1000BaseCX networks use cabling made of what material?

Explanation

1000BaseCX networks use cabling made of copper. Copper is commonly used in networking cables because it is a good conductor of electricity and allows for fast and reliable data transmission. Copper cables are also durable and can withstand the rigors of networking environments. Therefore, copper is the preferred material for cabling in 1000BaseCX networks.

Submit
16. What term refers to the source of data transmission over serial telecommunications links?

Explanation

Data Terminal Equipment (DTE) refers to the source of data transmission over serial telecommunications links. DTE is the device that generates or consumes data and is responsible for initiating or terminating a communication session. It can be a computer, terminal, or any other device that communicates with another device over a serial connection. DTE devices are typically connected to Data Communications Equipment (DCE), which provides the physical interface and handles the actual transmission of data. UART (Universal Asynchronous Receiver/Transmitter) is a hardware component that facilitates serial communication between a computer and peripheral devices. Local Area Network (LAN) refers to a network that connects computers and devices within a limited area.

Submit
17. What nonprofit corporation manages registration of IP addresses on the Internet in North America?

Explanation

ARIN (American Registry for Internet Numbers) is the correct answer because it is a nonprofit corporation that manages the registration of IP addresses in North America. ARIN allocates and assigns IP addresses to Internet service providers, organizations, and individuals in its region. It is responsible for ensuring the efficient and fair distribution of IP addresses and promoting the stable and secure operation of the Internet in North America.

Submit
18. What communication method allows for transmission to all network peers simultaneously?

Explanation

Broadcast is the correct answer because it is a communication method that allows for transmission to all network peers simultaneously. In a broadcast, a single message is sent to all devices on the network, regardless of their location or membership in any specific group. This is useful when information needs to be shared with all connected devices, such as network-wide announcements or updates.

Submit
19. What was the Unix protocol for sending files between two Unix computers on a network?

Explanation

UUCP (Unix-to-Unix Copy) was a protocol used for sending files between two Unix computers on a network. It allowed users to transfer files and execute commands remotely. UUCP was widely used before the advent of the internet and provided a reliable and efficient method for file transfer. LDAP (Lightweight Directory Access Protocol), POP3 (Post Office Protocol version 3), and DNS (Domain Name System) are all different protocols used for other purposes and not specifically designed for file transfer between Unix computers.

Submit
20. In what type of Ethernet network is passive termination most often used?

Explanation

Passive termination is most often used in 10Base2 Ethernet networks. 10Base2, also known as Thinnet, uses coaxial cables with BNC connectors. Passive termination refers to the use of a resistor at the end of the cable to prevent signal reflections. This type of termination is commonly used in 10Base2 networks to ensure proper signal transmission and prevent data loss or interference.

Submit
View My Results

Quiz Review Timeline (Updated): Oct 14, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What flag is set in the first packet of a TCP three way handshake?
What are the two sublayers of the data-link layer of the OSI model?
Signal degradation over a long cable run is called what?
Category 3 UTP cabling is rated for digital data transmission up to...
Which of these is a common method of converting analog signals into...
What TCP port number is usually assigned as the FTP "control port"?
BGP routing peers connect to each other via what TCP port number?
What network device restricts the expanse of a collision domain?
Which of the following authentication protocols passes credentials in...
The AppleTalk protocol uses what access control method?
What Windows service provides NetBIOS name registration and resolution...
What type of DNS record is known as a "alias" record?
What routing protocol allows Internet backbone routers to connect and...
Which of the following protocols is "connectionless"?
1000BaseCX networks use cabling made of what material?
What term refers to the source of data transmission over serial...
What nonprofit corporation manages registration of IP addresses on the...
What communication method allows for transmission to all network peers...
What was the Unix protocol for sending files between two Unix...
In what type of Ethernet network is passive termination most often...
Alert!

Advertisement