Tcpip Introduction Practice Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 80,095
| Attempts: 337
SettingsSettings
Please wait...
  • 1/200 Questions

    How many bits in a byte?

    • 8
    • 16
    • 4
    • 2
Please wait...
About This Quiz

This practice test focuses on the OSI model, covering key components like routers, bridges, and repeaters, and the layers they operate on. It tests knowledge on protocols such as TCP and IP, vital for networking professionals.

Tcpip  Introduction Practice Test - Quiz

Quiz Preview

  • 2. 

    Some top-level DNS domains are .com, .edu, and .mil

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Other top level DNS domains are .org, .us, .au

    Rate this question:

  • 3. 

    UDP is a reliable protocol.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    TCP is a reliable protocol

    Rate this question:

  • 4. 

    What is a MAC address?

    • The IP address of the host

    • The embedded protocol address

    • The hardware address assigned to the network card

    • The embedded protocol port address

    Correct Answer
    A. The hardware address assigned to the network card
    Explanation
    An Ethernet MAC address is a 48 bit address with the first 24 bits assigned to a specific organization by the IEEE, with the remaining bits left to the vendor’s discretion.

    Rate this question:

  • 5. 

    TCP is a connection-oriented protocol.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    TCP (Transmission Control Protocol) is indeed a connection-oriented protocol. This means that before any data transmission can occur, a connection must be established between the sender and receiver. TCP ensures that data is delivered reliably and in the correct order by using acknowledgments and retransmissions. It also handles flow control to prevent overwhelming the receiver with too much data at once. These features make TCP suitable for applications that require a reliable and ordered delivery of data, such as web browsing, email, and file transfers.

    Rate this question:

  • 6. 

    IPv4 addresses are 6 bytes long?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    IPv4 addresses are four bytes or 32 bits long. MAC addresses are 6.

    Rate this question:

  • 7. 

    The maximum decimal value for a byte is 255.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Binary 11111111=255

    Rate this question:

  • 8. 

    Two ways to terminate a TCP session are ICMP echo request and ICMP echo reply.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    ICMP echo request and ICMP echo reply are not ways to terminate a TCP session. ICMP echo request and reply are used for the ICMP protocol, which is a separate protocol from TCP. TCP sessions can be terminated by sending a TCP FIN (finish) packet or by forcibly closing the connection. Therefore, the given answer "False" is correct.

    Rate this question:

  • 9. 

    Which layer does the Data Link use to locate hosts on the network?

    • Port numbers

    • MAC addresses

    • Gateways

    • Network addresses

    Correct Answer
    A. MAC addresses
    Explanation
    Datalink Layer uses Hardware or MAC addresses. Network Layer uses Logical network addresses.

    Rate this question:

  • 10. 

    In IPv6, the broadcast address type is replaced with a new address type. What is it?

    • Unicast

    • Netcast

    • Anycast

    • Supercast

    • Multi-broadcast

    Correct Answer
    A. Anycast
    Explanation
    New to IPv6 is anycast. With this new type of address the network will take the responsibility of delivering the datagram with this address to anyone in an anycast group.

    Rate this question:

  • 11. 

    Which is the IP address range for a Class A IP address range?

    • 0 - 127

    • 128 - 191

    • 192 - 223

    • 224 - 239

    • 240 - 254

    Correct Answer
    A. 0 - 127
    Explanation
    Range: 1.x.x.x – 126.x.x.x

    Rate this question:

  • 12. 

    Which of the following is used for testing loopback?

    • 10.x.x.x

    • 172.16.x.x –x172.31.x.x

    • 192.168.x.x

    • 127.x.x.x

    Correct Answer
    A. 127.x.x.x
    Explanation
    127.x.x.x is reserved for loopback testing

    Rate this question:

  • 13. 

    Which is the IP address range for a Class B IP address range?

    • 0 - 127

    • 128 - 191

    • 192 - 223

    • 224 - 239

    • 240 - 254

    Correct Answer
    A. 128 - 191
    Explanation
    Range: 128.x.x.x – 191.x.x.x

    Rate this question:

  • 14. 

    A packet that is sent on an Ethernet link is known as a frame.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Refer RFC894,895,948,1042

    Rate this question:

  • 15. 

    Which of the following is NOT a well-known domain?

    • .us

    • .gov

    • .org

    • .host

    Correct Answer
    A. .host
    Explanation
    Other well know domain roots are .edu, .mil

    Rate this question:

  • 16. 

    Which port does DNS use?

    • 35

    • 53

    • 21

    • 23

    • 520

    • 666

    Correct Answer
    A. 53
    Explanation
    DNS resides at the application/process layer of TCP/IP and uses port 53. DNS resolves FQDN's to IP addresses.

    Rate this question:

  • 17. 

    Because TCP is full duplex both the client and server have to initiate a FIN to close their connection gracefully.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    When closing a connection TCP will also notify the upper layer protocols that there is no more data and that the opposite host has closed the connection.

    Rate this question:

  • 18. 

    Servers use ephemeral ports:

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The client port, also known as an ephemeral port, is used for the current session and freed afterward for re-use.

    Rate this question:

  • 19. 

    If a TCP task sends a window size of zero, how much data can the target receive?

    • The MTU

    • None

    • 1500 bytes

    • 1460 bytes

    Correct Answer
    A. None
    Explanation
    None, there is no room in the buffer for additional data. This congestion is typically caused because the application is not clearing the TCP buffer fast enough.

    Rate this question:

  • 20. 

    A DNS server:

    • Can associate an IP address with a host name only.

    • Can associate a host name with an IP address only.

    • Can associate either an IP address with a host name or host name with an IP address.

    • Can associate a MAC address with a host name.

    Correct Answer
    A. Can associate either an IP address with a host name or host name with an IP address.
    Explanation
    The Domain Name Server is used for name resolution with records of the IP address and host name.

    Rate this question:

  • 21. 

    The SYN bit signals the client's intention to:

    • Connect to the server.

    • Fragment a packet.

    • Terminate a session.

    • Push data to the server.

    Correct Answer
    A. Connect to the server.
    Explanation
    SYN=synchronize sequence numbers are used to initiate and establish a connection.

    Rate this question:

  • 22. 

    At what layer of the OSI model would a ROUTER operate at?

    • Presentation

    • Session

    • Transport

    • Network

    • Datalink

    • Physical

    Correct Answer
    A. Network
    Explanation
    Router operates on the Network Layer of the OSI model.

    Rate this question:

  • 23. 

    Which of the following are NOT layers of the OSI model?

    • Physical

    • Network

    • Media

    • Application

    • Presentation

    • System

    Correct Answer(s)
    A. Media
    A. System
    Explanation
    There are 7 layers in the OSI model: Physical, Data link, Network, Transport, Session, Presentation, and Application.

    Rate this question:

  • 24. 

    What OSI layer is responsible for converting bits into frames?

    • Application

    • Presentation

    • Session

    • Network

    • Datalink

    • Transport

    Correct Answer
    A. Datalink
    Explanation
    Datalink layer is responsible for converting bits of data into frames. This layer is also responsible for MAC or Physical addressing. CRC (Cyclic redundancy check) is added at this layer.

    Rate this question:

  • 25. 

    UDP operates at what layer of OSI model?

    • Session

    • Transport

    • Network

    • Datalink

    • Physical

    Correct Answer
    A. Transport
    Explanation
    UDP and TCP both operate at the Transport layer of the OSI model.

    Rate this question:

  • 26. 

    Which routing protocol makes a best path decision based on link state?

    • IGRP

    • RIP

    • RIP 2

    • OSPF

    Correct Answer
    A. OSPF
    Explanation
    Unlike RIP, OSPF builds its routing path by determining the shortest time to the target device.

    Rate this question:

  • 27. 

    The netmask tells a host what address bits identify the network and what address bits identify the host.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The netmask is refered to as the subnet mask.

    Rate this question:

  • 28. 

    Which of the following best characterizes ICMP?

    • It is used to communicate error conditions

    • It is used for connection-oriented communications

    • It is used for reliable communications

    • It is used for client/server communications

    Correct Answer
    A. It is used to communicate error conditions
    Explanation
    Internet Control Message Protocol (ICMP) is used between gateways and source host to notify hosts of problems that occurred during datagram processing.

    Rate this question:

  • 29. 

    Is a UDP checksum mandatory?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Some vendors choose not to use UDP's checksum. In this case, the value of this field is 0x0000. Acceptability of the data must be determined by the application.

    Rate this question:

  • 30. 

    A Class C address has:

    • 24 bits assigned for the network address, 8 bits assigned for the host address

    • 16 bits assigned for the network address, 16 bits assigned for the host address

    • 32 bits assigned for the network address, 0 bits assigned for the host address

    • 24 bits assigned for the network address, 24 bits assigned for the host address

    Correct Answer
    A. 24 bits assigned for the network address, 8 bits assigned for the host address
    Explanation
    Allows for 2,097,152 (221 - 2) distinct network addresses and 254 hosts per network.

    Rate this question:

  • 31. 

    The client port, also known as an ephemeral port, is used for the current session and freed afterward for re-use.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Ports can be reused once again after completion/termination of its current session.

    Rate this question:

  • 32. 

    A value of 6 in the byte 9 of the IP header means that the embedded protocol is TCP.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A value of 6 in the byte 9 of the IP header indicates that the embedded protocol is TCP. The IP header is a part of the IP packet and contains important information about the packet, including the protocol being used. The value 6 corresponds to the TCP protocol, which is a reliable and connection-oriented protocol commonly used for transmitting data over the internet. Therefore, the statement is true.

    Rate this question:

  • 33. 

    The tcpdump output shown below is in hexadecimal.09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The tcpdump output shown is not in hexadecimal format. It appears to be a line from a tcpdump capture, showing a network packet. The line includes the timestamp, source and destination IP addresses, and some additional information about the packet. The "S" in the line indicates that it is a TCP SYN packet, used for establishing a connection. The "win 512" indicates that the window size for the TCP connection is 512 bytes. Therefore, the correct answer is False, as the tcpdump output is not in hexadecimal format.

    Rate this question:

  • 34. 

    We would use a “Cross-Over” UTP cable type to be used to connect a switch to a hub.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A “Cross-Over” cable should be used in this instance to ensure connectivity.

    Rate this question:

  • 35. 

    In the tcpdump output shown below, what does 1173 represent?09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

    • Source sequence number

    • Source port

    • Source identifier

    • Source process ID

    Correct Answer
    A. Source port
    Explanation
    It represents the port number used to make the connection.

    Rate this question:

  • 36. 

    Which is the IP address range for a Class C IP address range?

    • 0 - 127

    • 128 - 191

    • 192 - 223

    • 224 - 239

    • 240 - 254

    Correct Answer
    A. 192 - 223
    Explanation
    Range: 192.x.x.x – 223.x.x.x

    Rate this question:

  • 37. 

    Which is the IP address range for a Class E IP address range?

    • 0 - 127

    • 128 - 191

    • 192 - 223

    • 224 - 239

    • 240 - 255

    Correct Answer
    A. 240 - 255
    Explanation
    Range: 240.x.x.x – 255.x.x.x

    Rate this question:

  • 38. 

    We would use a “Cross-Over” UTP cable type to be used to connect a router to a hub.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    A “Straight-Through” cable should be used in this instance to ensure connectivity.

    Rate this question:

  • 39. 

    How many layers are in the OSI model?

    • 4

    • 5

    • 6

    • 7

    • 8

    Correct Answer
    A. 7
    Explanation
    There are 7 layers in the OSI model: Physical, Data link, Network, Transport, Session, Presentation, and Application.

    Rate this question:

  • 40. 

    When there are errors on the network, ICMP variation reports are generated. Which device will receive them?

    • The Original Target

    • The Original Source

    • The device that found the problem

    • The system administrators audit log

    Correct Answer
    A. The Original Source
    Explanation
    ICMP error messages originate at the point of discovery and are sent to the original source.

    Rate this question:

  • 41. 

    What 2 OSI layers are above and beneath the Network layer? (Choose 2)

    • Presentation

    • Network

    • Session

    • Transport

    • Application

    • Datalink

    • Physical

    Correct Answer(s)
    A. Transport
    A. Datalink
    Explanation
    The order of OSI layers is: Physical, Datalink, Network, Transport, Session, Presentation, and Application.

    Rate this question:

  • 42. 

    Do ARP requests leave the subnet?

    • Yes

    • No

    • Depends on the configuration of the router

    Correct Answer
    A. No
    Explanation
    ARP performs a resolution for an unknown physical address. A physical address is not passed beyond the broadcast domain. Broadcast domains are bound in by routers.

    Rate this question:

  • 43. 

    RFC 2151 details several troubleshooting tools that are built-in all TCP/IP systems. These are?

    • IPconfig

    • ARP

    • Netstat

    • Sniffer

    • Netcat

    • Net Use

    • Neotrace

    Correct Answer(s)
    A. IPconfig
    A. ARP
    A. Netstat
    Explanation
    IPconfig, ARP, Netstat, and Nslookup are some of the tools listed in RFC 2151. Sniffer is a brand name for a protocol analyzer. Neotrace is a graphical trace route program. Netcat is a hacker's tool that can be used to setup back doors on compromised systems; it is not listed in RFC 2151.

    Rate this question:

  • 44. 

    The OSI model is often used to describe communications architectures.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The Open System Interconnect (OSI) reference model is logical model that serves a way to understand how an internet work.

    Rate this question:

  • 45. 

    Which of the following best characterizes TCP versus UDP in most cases?

    • TCP is less reliable and quicker

    • TCP is slower, more reliable and requires more overhead

    • TCP is faster, more reliable and more streamlined

    • TCP is less reliable and connection-oriented

    Correct Answer
    A. TCP is slower, more reliable and requires more overhead
    Explanation
    TCP is slower compared to UDP because it includes error-checking and flow control mechanisms, which ensure reliable delivery of data packets. TCP is also more reliable as it guarantees that all packets are received in the correct order and without errors. Additionally, TCP requires more overhead as it establishes a connection before data transfer and manages congestion control.

    Rate this question:

  • 46. 

    The only IP protocols are ICMP, TCP, and UDP

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The given statement is false. In addition to ICMP, TCP, and UDP, there are other IP protocols as well. Some examples include IPsec, IGMP, OSPF, and BGP. These protocols serve different purposes and are used for various networking functions such as security, multicasting, and routing. Therefore, the statement that the only IP protocols are ICMP, TCP, and UDP is incorrect.

    Rate this question:

  • 47. 

    At what layer of the OSI model would a BRIDGE operate at?

    • Presentation

    • Session

    • Transport

    • Network

    • Datalink

    • Physical

    Correct Answer
    A. Datalink
    Explanation
    Bridge operates at the Datalink layer of the OSI model. Bridge makes it routing decisions based on the MAC address.

    Rate this question:

  • 48. 

    What is a function of a reliable transport layer connection?

    • Route selection

    • Acknowledgments

    • Session checkpoints

    • System authentication

    Correct Answer
    A. Acknowledgments
    Explanation
    According to Cisco: Some transport-layer implementations include Transmission Control Protocol, Name Binding Protocol, and OSI transport protocols. Transmission Control Protocol (TCP) is the protocol in the TCP/IP suite that provides reliable transmission of data. Name Binding Protocol (NBP) is the protocol that associates AppleTalk names with addresses. OSI transport protocols are a series of transport protocols in the OSI protocol suite.

    Rate this question:

  • 49. 

    OSPF is link state protocols.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Link state protocols recreate the complete network topology based on the information learned from other routers.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 09, 2011
    Quiz Created by
    Apalani
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.