Tcpip Introduction Practice Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 80,705
| Attempts: 343 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. Some top-level DNS domains are .com, .edu, and .mil

Explanation

Other top level DNS domains are .org, .us, .au

Submit
Please wait...
About This Quiz
Tcpip  Introduction Practice Test - Quiz

This practice test focuses on the OSI model, covering key components like routers, bridges, and repeaters, and the layers they operate on. It tests knowledge on protocols such... see moreas TCP and IP, vital for networking professionals. see less

2. TCP is a connection-oriented protocol.

Explanation

TCP (Transmission Control Protocol) is indeed a connection-oriented protocol. This means that before any data transmission can occur, a connection must be established between the sender and receiver. TCP ensures that data is delivered reliably and in the correct order by using acknowledgments and retransmissions. It also handles flow control to prevent overwhelming the receiver with too much data at once. These features make TCP suitable for applications that require a reliable and ordered delivery of data, such as web browsing, email, and file transfers.

Submit
3. How many bits in a byte?

Explanation

Binary 11110000=8bits

Submit
4. What is a MAC address?

Explanation

An Ethernet MAC address is a 48 bit address with the first 24 bits assigned to a specific organization by the IEEE, with the remaining bits left to the vendor’s discretion.

Submit
5. IPv4 addresses are 6 bytes long?

Explanation

IPv4 addresses are four bytes or 32 bits long. MAC addresses are 6.

Submit
6. UDP is a reliable protocol.

Explanation

TCP is a reliable protocol

Submit
7. Two ways to terminate a TCP session are ICMP echo request and ICMP echo reply.

Explanation

ICMP echo request and ICMP echo reply are not ways to terminate a TCP session. ICMP echo request and reply are used for the ICMP protocol, which is a separate protocol from TCP. TCP sessions can be terminated by sending a TCP FIN (finish) packet or by forcibly closing the connection. Therefore, the given answer "False" is correct.

Submit
8. Which is the IP address range for a Class A IP address range?

Explanation

Range: 1.x.x.x – 126.x.x.x

Submit
9. In IPv6, the broadcast address type is replaced with a new address type. What is it?

Explanation

New to IPv6 is anycast. With this new type of address the network will take the responsibility of delivering the datagram with this address to anyone in an anycast group.

Submit
10. The maximum decimal value for a byte is 255.

Explanation

Binary 11111111=255

Submit
11. Which is the IP address range for a Class B IP address range?

Explanation

Range: 128.x.x.x – 191.x.x.x

Submit
12. Which of the following is NOT a well-known domain?

Explanation

Other well know domain roots are .edu, .mil

Submit
13. Which layer does the Data Link use to locate hosts on the network?

Explanation

Datalink Layer uses Hardware or MAC addresses. Network Layer uses Logical network addresses.

Submit
14. A packet that is sent on an Ethernet link is known as a frame.

Explanation

Refer RFC894,895,948,1042

Submit
15. Which of the following is used for testing loopback?

Explanation

127.x.x.x is reserved for loopback testing

Submit
16. If a TCP task sends a window size of zero, how much data can the target receive?

Explanation

None, there is no room in the buffer for additional data. This congestion is typically caused because the application is not clearing the TCP buffer fast enough.

Submit
17. The netmask tells a host what address bits identify the network and what address bits identify the host.

Explanation

The netmask is refered to as the subnet mask.

Submit
18. At what layer of the OSI model would a ROUTER operate at?

Explanation

Router operates on the Network Layer of the OSI model.

Submit
19. The client port, also known as an ephemeral port, is used for the current session and freed afterward for re-use.

Explanation

Ports can be reused once again after completion/termination of its current session.

Submit
20. A value of 6 in the byte 9 of the IP header means that the embedded protocol is TCP.

Explanation

A value of 6 in the byte 9 of the IP header indicates that the embedded protocol is TCP. The IP header is a part of the IP packet and contains important information about the packet, including the protocol being used. The value 6 corresponds to the TCP protocol, which is a reliable and connection-oriented protocol commonly used for transmitting data over the internet. Therefore, the statement is true.

Submit
21. The tcpdump output shown below is in hexadecimal.
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

The tcpdump output shown is not in hexadecimal format. It appears to be a line from a tcpdump capture, showing a network packet. The line includes the timestamp, source and destination IP addresses, and some additional information about the packet. The "S" in the line indicates that it is a TCP SYN packet, used for establishing a connection. The "win 512" indicates that the window size for the TCP connection is 512 bytes. Therefore, the correct answer is False, as the tcpdump output is not in hexadecimal format.

Submit
22. We would use a “Cross-Over” UTP cable type to be used to connect a switch to a hub.

Explanation

A “Cross-Over” cable should be used in this instance to ensure connectivity.

Submit
23. Because TCP is full duplex both the client and server have to initiate a FIN to close their connection gracefully.

Explanation

When closing a connection TCP will also notify the upper layer protocols that there is no more data and that the opposite host has closed the connection.

Submit
24. Servers use ephemeral ports:

Explanation

The client port, also known as an ephemeral port, is used for the current session and freed afterward for re-use.

Submit
25. Which is the IP address range for a Class C IP address range?

Explanation

Range: 192.x.x.x – 223.x.x.x

Submit
26. Which is the IP address range for a Class E IP address range?

Explanation

Range: 240.x.x.x – 255.x.x.x

Submit
27. Which port does DNS use?

Explanation

DNS resides at the application/process layer of TCP/IP and uses port 53. DNS resolves FQDN's to IP addresses.

Submit
28. The only IP protocols are ICMP, TCP, and UDP

Explanation

The given statement is false. In addition to ICMP, TCP, and UDP, there are other IP protocols as well. Some examples include IPsec, IGMP, OSPF, and BGP. These protocols serve different purposes and are used for various networking functions such as security, multicasting, and routing. Therefore, the statement that the only IP protocols are ICMP, TCP, and UDP is incorrect.

Submit
29. The SYN bit signals the client's intention to:

Explanation

SYN=synchronize sequence numbers are used to initiate and establish a connection.

Submit
30. When there are errors on the network, ICMP variation reports are generated. Which device will receive them?

Explanation

ICMP error messages originate at the point of discovery and are sent to the original source.

Submit
31. A DNS server:

Explanation

The Domain Name Server is used for name resolution with records of the IP address and host name.

Submit
32. OSPF is link state protocols.

Explanation

Link state protocols recreate the complete network topology based on the information learned from other routers.

Submit
33. Which of the following best characterizes ICMP?

Explanation

Internet Control Message Protocol (ICMP) is used between gateways and source host to notify hosts of problems that occurred during datagram processing.

Submit
34. At what layer of the OSI model would a BRIDGE operate at?

Explanation

Bridge operates at the Datalink layer of the OSI model. Bridge makes it routing decisions based on the MAC address.

Submit
35. What OSI layer is responsible for converting bits into frames?

Explanation

Datalink layer is responsible for converting bits of data into frames. This layer is also responsible for MAC or Physical addressing. CRC (Cyclic redundancy check) is added at this layer.

Submit
36. UDP operates at what layer of OSI model?

Explanation

UDP and TCP both operate at the Transport layer of the OSI model.

Submit
37. Which of the following are NOT layers of the OSI model?

Explanation

There are 7 layers in the OSI model: Physical, Data link, Network, Transport, Session, Presentation, and Application.

Submit
38. How many layers are in the OSI model?

Explanation

There are 7 layers in the OSI model: Physical, Data link, Network, Transport, Session, Presentation, and Application.

Submit
39. Is a UDP checksum mandatory?

Explanation

Some vendors choose not to use UDP's checksum. In this case, the value of this field is 0x0000. Acceptability of the data must be determined by the application.

Submit
40. Which routing protocol makes a best path decision based on link state?

Explanation

Unlike RIP, OSPF builds its routing path by determining the shortest time to the target device.

Submit
41. A Class C address has:

Explanation

Allows for 2,097,152 (221 - 2) distinct network addresses and 254 hosts per network.

Submit
42. In the tcpdump output shown below, what does 1173 represent?
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

It represents the port number used to make the connection.

Submit
43. We would use a “Cross-Over” UTP cable type to be used to connect a router to a hub.

Explanation

A “Straight-Through” cable should be used in this instance to ensure connectivity.

Submit
44. Which of the following best characterizes TCP versus UDP in most cases?

Explanation

TCP is slower compared to UDP because it includes error-checking and flow control mechanisms, which ensure reliable delivery of data packets. TCP is also more reliable as it guarantees that all packets are received in the correct order and without errors. Additionally, TCP requires more overhead as it establishes a connection before data transfer and manages congestion control.

Submit
45. Do ARP requests leave the subnet?

Explanation

ARP performs a resolution for an unknown physical address. A physical address is not passed beyond the broadcast domain. Broadcast domains are bound in by routers.

Submit
46. What 2 OSI layers are above and beneath the Network layer? (Choose 2)

Explanation

The order of OSI layers is: Physical, Datalink, Network, Transport, Session, Presentation, and Application.

Submit
47. RFC 2151 details several troubleshooting tools that are built-in all TCP/IP systems. These are?

Explanation

IPconfig, ARP, Netstat, and Nslookup are some of the tools listed in RFC 2151. Sniffer is a brand name for a protocol analyzer. Neotrace is a graphical trace route program. Netcat is a hacker's tool that can be used to setup back doors on compromised systems; it is not listed in RFC 2151.

Submit
48. The OSI model is often used to describe communications architectures.

Explanation

The Open System Interconnect (OSI) reference model is logical model that serves a way to understand how an internet work.

Submit
49. Trusted or "well-known" port numbers are less than 1024.

Explanation

Numbers above 1024 are know as dynamic ports. Registered ports are registered by vendor specific.

Submit
50. The client sends a RESET to the server to indicate its desire to reopen a half closed session.

Explanation

A server responses with the RESET and ACK flags set to an attempted client connection where the attempted TCP port connection to the server is not listening.

Submit
51. When tcpdump is displayed in hexadecimal you see the entire datagram captured by tcpdump if the snapshot length (snaplen) parameter is larger than the datagram size.

Explanation

If the snapshot length (snaplen) parameter is larger than the datagram size, tcpdump will display the entire datagram in hexadecimal format. This means that all the data captured by tcpdump will be visible, providing a comprehensive view of the captured datagram.

Submit
52. Which is the IP address range for a Class D IP address range?

Explanation

Range: 224.x.x.x – 239.x.x.x

Submit
53. Do the UDP and TCP protocols operate at the same layer of the OSI model?

Explanation

This is true. UDP and TCP both operate at the Transport layer of the OSI model. The difference between these protocols is that TCP is connection-oriented and UDP is connectionless.

Submit
54. Telnet operates at what layer of the OSI model?

Explanation

Telnet, WWW and FTP function at the Application layer of the OSI model.

Submit
55. What is a function of a reliable transport layer connection?

Explanation

According to Cisco: Some transport-layer implementations include Transmission Control Protocol, Name Binding Protocol, and OSI transport protocols. Transmission Control Protocol (TCP) is the protocol in the TCP/IP suite that provides reliable transmission of data. Name Binding Protocol (NBP) is the protocol that associates AppleTalk names with addresses. OSI transport protocols are a series of transport protocols in the OSI protocol suite.

Submit
56. The IP protocol field identifies:

Explanation

Indicates which upper layer protocol is encapsulated in the data portion of this IP datagram (ie., 1=ICMP, 6=TCP)

Submit
57. We would use a “Cross-Over” UTP cable type to be used to connect a router to a switch.

Explanation

A “Straight-Through” cable should be used in this instance to ensure connectivity.

Submit
58. The length of a normal IPv4 header is 24 bytes?

Explanation

False, IP's normal header length is 20 bytes. It may be longer if options are present.

Submit
59. Which host-to-host protocol is used for reliability?

Explanation

The TCP header contains all of the items needed for reliably data communication. Some of the features that insure the reliability of TCP include: setup, flow control, sequence numbers, and adaptive timeouts.

Submit
60. The client port in the tcpdump output shown below is 1173.
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

The Server port is 21 and Client port is 1173.

Submit
61. Ports can have a value of 0 through 65,535.

Explanation

Ports in computer networking can have a value ranging from 0 to 65,535. This range is defined by the Internet Assigned Numbers Authority (IANA) and is commonly used in TCP/IP protocols. Each port number represents a specific service or application running on a device. The lower port numbers (0-1023) are reserved for well-known services like HTTP (port 80) or FTP (port 21), while the higher port numbers (1024-65,535) are available for dynamic or private use. Therefore, the statement "Ports can have a value of 0 through 65,535" is true.

Submit
62. The server port in the tcpdump output shown below is 1173.
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

This is the Clients port. The Server port is 21.

Submit
63. Email and FTP work at which layer of the OSI model?

Explanation

Email and FTP function at the Application layer. Telnet and WWW also function at the Application layer.

Submit
64. Compression takes place at what layer of the OSI model?

Explanation

Compression takes place at the Presentation layer. Presentation layer is also responsible for encryption. Redirector works at this layer.

Submit
65. Which two ports are typically required for email functions?

Explanation

Email uses two well known ports for mail services: 25 (SMPT) and 110 (POP3). Port 23 is used for telnet, 111 is Sun RPC, and 179 is used for BGP

Submit
66. What does the Address Resolution Protocol (ARP) do?

Explanation

ARP resolves a know IP address with a MAC address.

Submit
67. Hosts typically know how to route a packet using a default router.

Explanation

Host typically attempt to reach a location by determining whether the destination IP address is on the same subnet if not it is sent through the default gateway.

Submit
68. The IP address 172.20.0.0 is in the Class B range of addresses.

Explanation

Range: 128.x.x.x – 191.x.x.x

Submit
69. Tcpdump "sniffs" packets from:

Explanation

This is usually done through a network monitoring tool.

Submit
70. Which of the following is a broadcast MAC address?

Explanation

Broadcast MAC addresses are displayed as ff ff ff ff ff ff.

Submit
71. When examining the headers of packets displayed with tcpdump, counting begins with:

Explanation

When examining the headers of packets displayed with tcpdump, counting begins with byte 0. This means that the first byte in the packet header is assigned the value of 0 and subsequent bytes are numbered incrementally. This is a common convention in computer science and networking, where counting often starts from 0 instead of 1.

Submit
72. Which layer of the OSI model is responsible for translation of data?

Explanation

Data translation is done at the Presentation layer. By providing translation services, the Presentation layer ensures that data transferred from the Application layer of one system can be read by the Application layer of another host.

Submit
73. What is the function of ARP?

Explanation

ARP is a helper protocol as it performs resolution. ARP resolves known IP addresses to unknown physical addresses. The results are stored in the ARP cache.

Submit
74. Which two of the following are routing protocols?

Explanation

Rip and IS-IS are both routing protocols. IP, IPX, and DDP are routable protocols.

Submit
75. A Class B address has 8 bits to represent the network address and 24 bits to represent the host address.

Explanation

Allows for 16,384 (214 - 2) distinct network addresses and 65,534 hosts per network.

Submit
76. The PUSH flag says to:

Explanation

The correct answer is "send the data in this TCP segment." The PUSH flag in TCP is used to indicate that the data in the current segment should be pushed to the receiving application immediately, without waiting for more data to arrive. This flag is set when the sender wants to ensure that the data is delivered promptly and does not need to be buffered or delayed.

Submit
77. What layer of the OSI model is responsible for the physical addressing?

Explanation

Datalink layer is responsible for the physical addressing and Network layer is responsible for the logical or Network addressing.

Submit
78. FTP operates at what layer of the OSI model?

Explanation

Telnet, WWW and FTP function at the Application layer of the OSI model.

Submit
79. During the first and second step of the TCP three-step startup, the header is 24 bytes.  What option is being carried?

Explanation

During the first two steps of the three-step startup, the TCP header length is extended to 24 bytes. During these two steps, the max segment size (MSS) is being determined. The MSS option informs the other device the maximum amount of data TCP can carry as payload without fragmentation. This data is referred to as a segment.

Submit
80. What happens when an ICMP message cannot be delivered?

Explanation

Nothing special happens when an ICMP message cannot be delivered. The error message is simply discarded.

Submit
81. What tool is useful for troubleshooting DNS?

Explanation

NSlookup is used for troubleshooting and analyzing DNS.

Submit
82. A server port of UDP or TCP 53 is typically associated with what service?

Explanation

DNS uses port 53

Submit
83. The UNIX /etc/services file associates:

Explanation

This is similar like the ‘hosts’ file.

Submit
84. Active HUBs operate at which layer of the OSI model?

Explanation

Hubs (Both active and passive) operate at the Physical layer of the OSI model. Repeaters and Repeaters, Amplifiers and transceivers also operate at physical layer.

Submit
85. Inside the IP header is the protocol field. The numbers contained there reference the next header.  What is the number used in that field to reference TCP?

Explanation

The protocol field carries the ID number of the next higher layer protocol. Common protocol numbers include: 1 ICMP, 2 IGMP, 6 TCP, 17 UDP, and 88 IGRP.

Submit
86. Which two ports are required for DHCP?

Explanation

DHCP uses two well known ports for the client and server: 67 and 68. DHCP uses the same well known port numbers as BootP

Submit
87. How does a host that has sent TCP data know that the data has been received?

Explanation

The Acknowledgement is the sequence number of the next packet that a host expects to receive.

Submit
88. Which TCP/IP protocol is associated with routing?

Explanation

Internet Protocol (IP) is used for routing purposes.

Submit
89. The maximum length of an IP header is 60 bytes?

Explanation

With options such as strict source or loose source routing, an IP header may extend up to 60 bytes.

Submit
90. Which RFC has detailed specs on UDP?

Explanation

RFC 768 describes the operation of UDP.

Submit
91. The field that is 9 bytes offset into the IP header is:

Explanation

The correct answer is the embedded IP protocol. The IP header is a part of the IP packet that contains important information about the packet, such as the source and destination IP addresses, protocol, and other control information. The field that is 9 bytes offset into the IP header refers to the specific position within the header where this information is stored. In this case, the embedded IP protocol refers to the protocol field, which indicates the protocol used in the data portion of the IP packet, such as TCP, UDP, or ICMP.

Submit
92. Which of the following is not reserved for private addressing?

Explanation

127.x.x.x is reserved for loopback testing

Submit
93. Routing of IP is a function of which OSI layer?

Explanation

Network layer is responsible for Logical addressing, routing of message, determining the best route.

Submit
94. TCP protocol operates at which layer of the OSI model?

Explanation

TCP is the transport protocol and operates at the transport layer. UDP also operates at this layer.

Submit
95. At which layer of the OSI model does Frame Relay operate?

Explanation

Frame Relay operates at the Data Link layer.

Submit
96. If a hacker monitors someone login to the company's FTP server which items below will he see displayed in clear text?

Explanation

One of the problems with protocols such as FTP and Telnet is that all of its communications are passed in clear text. This includes usernames and passwords.

Submit
97. IP data is referred to as a packet; Ethernet information is called a frame. What is TCP's information called?

Explanation

TCP data is considered a segment, whereas UDP data is referenced to as a datagram. IP data is called a packet or datagram since it is connectionless in nature.

Submit
98. The tcpdump -s option can change the number of bytes collected.

Explanation

The tcpdump -s option is used to specify the snaplen, which determines the number of bytes to be captured from each packet. By default, tcpdump captures 65535 bytes per packet. However, using the -s option, we can change this value to any desired number. Therefore, the statement "The tcpdump -s option can change the number of bytes collected" is true.

Submit
99. The three-way handshake requires the following sequence of flags in the first three exchanges:
record 1: SYN/ACK record 2: SYN record 3: ACK

Explanation

SYN>ACK,SYN>ACK

Submit
100. The three parts of a TCP connection are typically:

Explanation

The three parts of a TCP connection are session establishment, data transfer, and session termination. Session establishment refers to the process of establishing a connection between the client and the server. Data transfer involves the exchange of data packets between the client and the server. Session termination is the process of ending the connection between the client and the server. These three parts form the basic lifecycle of a TCP connection.

Submit
101. Which are classifications of RFC documents?

Explanation

They are all classifications of RFC documents.

Submit
102. What does ‘ping’ stand for?

Explanation

PING stands for “Packet InterNet Groper”

Submit
103. What does the acronym OSI represent?

Explanation

OSI stands for Open System Interconnection and is just a model.

Submit
104. Musical Instrument Digital Interface (MIDI) standard is used for digital music. Which OSI layer does this standard belong to?

Explanation

Presentation layer is responsible for ASCII, JPEG, MPEG, Graphics, images, multimedia, compression and encryption.

Submit
105. How many layers are in the TCP/IP model?

Explanation

The Department of Defense TCP/IP model is based on 4 layers.

Submit
106. The tcpdump -x option dumps the record in hexadecimal.

Explanation

The tcpdump -x option is used to display the packet data in hexadecimal format. This allows for a more detailed and low-level analysis of the packets being captured. By enabling this option, the tcpdump command will output the packet records in a hexadecimal representation, which can be useful for troubleshooting and understanding the content of the packets.

Submit
107. If a tcpdump record is UDP, tcpdump will always display "UDP" in the output.

Explanation

If a tcpdump record is UDP, tcpdump will not always display "UDP" in the output. Tcpdump is a packet analyzer tool that captures and analyzes network traffic. While tcpdump can identify UDP packets, it does not necessarily display the protocol name in the output. The output may include other information about the UDP packet, such as source and destination IP addresses, ports, and payload data, but it may not explicitly state "UDP". Therefore, the statement is false.

Submit
108. At which layer of the OSI model determines which path data sent should use based on the available network conditions and priority of service?

Explanation

Addressing and routing takes place at the Network layer of the OSI model.

Submit
109. How many layers are in the DOD model?

Explanation

There are 4 layers in the DOD model: Network Access, Internet, Host-to-Host, and Process/Application.

Submit
110. The first step of the three-step handshake includes a number that is used to identify acknowledgement of a by the destination.  What is that field labeled?

Explanation

The source sequence number is used to keep track of each byte of data transferred and to provide reliability.

Submit
111. If a TCP host has a MSS of 1024 and a current window size of 4096 what is the maximum amount of data this host can receive in the next segment?

Explanation

The smaller of the two values will always be the constraint that determines the most data the host can receive.

Submit
112. How many bytes is a UDP header?

Explanation

A UDP header is always a fixed 8 bytes long. Its fields consist of: source port, target port, message length, and checksum.

Submit
113. How many bytes in an IPv6 address?

Explanation

Because of address depletion and increasing demand, IPv6 addresses will be 128 bytes.

Submit
114. While using your new protocol analyzer, you notice the same frame repeatedly being sent in the TCP process. What does this mean?

Explanation

This is caused by some problem along the path to the target device. A chock point such as an over utilized router may be the source of the trouble.

Submit
115. Which RFC has detailed specs on IP?

Explanation

RFC 791 details the operation of the IP protocol. A current copy of this document may be downloaded from www.ietf.org.

Submit
116. In the tcpdump output shown below, what does 09:32:43:9100000 represent? 09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

09:32:43:9100000 represents the timestamp when the record was captured.

Submit
117. What layer of the OSI model ensures that packets sent are delivered error free, in the correct sequence and without losses in transit?

Explanation

Transport Layer is responsible for error-free delivery, and for assembling packets in correct sequence.

Submit
118. TCP uses which field for flow control purposes?

Explanation

The sender window size informs the other device the total amount of data that can be accepted without acknowledgment. This value is the maximum amount of buffer the device has available for data storage.

Submit
119. At what layer of the OSI model would a REPEATER operate at?

Explanation

Repeater operates at the Physical Layer.

Submit
120. A normal TCP header is 20 bytes long?

Explanation

TCP has a normal header length of 20 bytes. Only during the first two steps of the three step startup will that length be extended to 24 bytes. During these two steps, the MSS is being determined.

Submit
121. Which port would you block related to HTTP services?

Explanation

HTTP uses the well known port of 80. Port 53 is used for DNS, 69 is TFTP, 443 is HTTPS.

Submit
122. What is the dotted decimal subnet mask represented by a /16 binary bit count?

Explanation

Many vendors, including Cisco, prefer the prefix notation as an alternate method of displaying the mask. /16 represent the number of binary ones.

Submit
123. Joe has been using ping and has been experimenting with its various options.  Why would he use -v options?

Explanation

Type of services (TOS) determines Quality of Service (QOS). This field controls the precedence and TOS to be used. Theses options include delay, throughput, reliability, and cost.

Submit
124. Ethernet announces ARP by placing a specific value in the type field. What is this value?

Explanation

ARP is used to resolve a known IP address to an unknown MAC address. The Ethernet type field is used for demultiplexing the frame and to determine which process should receive the data packet.

Submit
125. An IP protocol field of 0x06 indicates IP is carrying which protocol as its payload?

Explanation

The protocol field carries the ID number of the next higher layer protocol. Common protocol numbers include 0x01 ICMP, 0x06 TCP, 0x11 UDP, and 0x58 IGRP. HTTP resides at the application layer and is addressed at port 80.

Submit
126. An IP protocol field of 0x01 indicates IP is carrying which protocol as its payload?

Explanation

The protocol field carries the ID number of the next higher layer protocol. Common protocol numbers include 0x01 ICMP, 0x06 TCP, 0x11 UDP, and 0x58 IGRP. SMTP resides at the application layer and is addressed by port 25.

Submit
127. One common UDP application is TFTP, what port does it use?

Explanation

TFTP is connectionless in nature. It operates in conjunction with UDP. It is commonly used to restore and backup router configurations. Port 43 is WHO is. Port 19 is Chargin, a character generator.

Submit
128. What does a router do?

Explanation

Routers help map the path used to move packets from one location to another.

Submit
129. TCP begins a connection with:

Explanation

Only in the first step of the three-step startup is the sequence number flag "SYN" flag set. The second step of the startup process is characterized by the use of the "ACK-SYN" flags. The final step sets the flag field to ACK. These steps are performed each time a TCP based program/service is initiated.

Submit
130. In the tcpdump output shown below, what does dns.net represent?
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

The destination has ftp port 21/tcp File Transfer [Control] used.

Submit
131. In the tcpdump output shown below, what does the "S" indicate?
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

The "S" in the tcpdump output indicates that nmap.edu wants to start a connection with dns.net. This is indicated by the "S" flag, which stands for SYN (synchronize). The SYN flag is used in the TCP three-way handshake process to establish a connection between two hosts.

Submit
132. What embedded protocol is used in the tcpdump record shown below?
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

The correct answer is TCP. The tcpdump record shows a packet with the source address nmap.edu.1173 and the destination address dns.net.21. The "S" flag indicates that this is a TCP SYN packet, which is used to initiate a TCP connection. Therefore, the embedded protocol in the tcpdump record is TCP.

Submit
133. Server port numbers are typically:

Explanation

Generally the server ports are well known port numbers that do not change.

Submit
134. Which is the IP address range for MULTICASTING?

Explanation

This range is used for multicasting purposes.

Submit
135. Ports are used to identify applications and aid in the communication process. Three types of port numbers are?

Explanation

Well-known and registered ports are assigned to applications and services. Dynamic ports are used by clients and are temporary in nature. The netstat command can be used to display the ports currently in use.

Submit
136. What are ICMP type 5 used for?

Explanation

Type 5 ICMP messages are used for redirection. This usually takes place when a router determines a better path.

Submit
137. IPv4 uses the TTL field to limit how may times an IP datagram can be forwarded. What is the maximum value in hexadecimal and decimal?

Explanation

Analyzers typically display IP header information in hexadecimal. Mastering its conversion into decimal is critical for effective header analysis. The TTL field of the IP header is 1 byte. With one byte available, the maximum number of hops is 255 decimal or 0xFF.

Submit
138. Normally, TCP utilizes a four-step shutdown. When things go wrong and this is not possible, what flag is set?

Explanation

The reset flag is used to signify the abnormal end to a session. It is used because of communication errors, internal failures, or because a system has suddenly been powered down.

Submit
139. What does DNS resolve to IP addresses?

Explanation

DNS resolves fully qualified domain names (FQDN's) to IP addresses. It functions as a helper protocol.

Submit
140. Which two ports would you block related to FTP services?

Explanation

FTP uses two well known ports for data transfer: 20 and 21. Port 22 is used for SSH, 161 & 162 is SNMP.

Submit
141. What do TCP sequence numbers count? 

Explanation

TCP utilizes a byte counter. The sequence counter increases by one for each byte of transferred data. This counter is used to verify the amount of data moved.

Submit
142. What does an ICMP type 3, code 3 mean?

Explanation

ICMP type 3 messages are generated because of host unreachable problems. A code 3 specifies the application port is unreachable. The first four codes (0-3) are considered hierarchical in nature indicating just how far the datagram got before being rejected.

Submit
143. A server response with the RESET and ACK flags set to an attempted client connection means:

Explanation

When a server response includes the RESET and ACK flags set to an attempted client connection, it means that the server received the connection request from the client but is indicating that the TCP port the client is trying to connect to is not listening. This could be due to various reasons such as the port being closed or the server not running the service associated with that port. Therefore, the correct answer is that the attempted TCP port connection to the server is not listening.

Submit
144. Which OSI layer uses data segments?

Explanation

Transport layer is responsible for Error-free delivery, Segment data, reassemble data, sequencing.

Submit
145. At which layer of the OSI model does SNMP operate?

Explanation

SNMP operates at the Application layer of the OSI model. The following protocols and services are also operate at the Application layer: Telnet, HTTP, FTP, WWW browsers, NFS, SMTP gateways, X.400 mail.

Submit
146. Which RFC has detailed specs on the ICMP protocol?

Explanation

RFC 792 details the operation of the ICMP protocol.

Submit
147. Which OSI layer defines MediaPlayer standard?

Explanation

Presentation layer is responsible for ASCII, JPEG, MPEG, Graphics, images, multimedia, compression and encryption.

Submit
148. What is the default value for the Max Segment Size field in the TCP header?

Explanation

The MSS option informs the other device the maximum amount of data TCP can carry as payload in each segment. If the MSS is not specified during the startup process, it will default to 536 bytes.

Submit
149. The range of well known ports is from?

Explanation

Well-known ports are assigned to applications and are described by RFC's. Registered ports are used by applications that are not documented by official RFC's. Dynamic ports are used by clients and are temporary in nature.

Submit
150. Which RFC lists port and protocol numbers?

Explanation

RFC's are Requests for Comments. These documents detail the operation of TCP/IP's many protocols and applications. Some of the types of RFC's include: Best Common Practices (BCP's), Standards (STD's), and For Your Information (FYI's). Current copies of the documents may be downloaded from www.ietf.org

Submit
151. Does TFTP require authentication?

Explanation

TFTP requires no authentication. It operates in conjunction with UDP, which is connectionless in nature.

Submit
152. Which two of the following protocols are based on the Bellman Ford algorithm?

Explanation

Both RIP and RIP2 base their routing decision on hops. This underlying process is known as the Bellman Ford algorithm.

Submit
153. Which is not a rule applied to assigning IP addresses to hosts?

Explanation

All “0” refer to the local subnet/this network address.

Submit
154. At which layer of the OSI model does NetBIOS operate?

Explanation

NetBIOS operates at the Session Layer of the OSI model.

Submit
155. While doing your daily capture of network activity you notice some captured traffic with a target IP address of 224.0.0.1.  What type of address is this and what is the binary equivalent of the first byte?

Explanation

Addresses ranging from 224 to 239 are used for multicast. Class D addresses have the first three bits set to 1 and the fourth set to 0. This determines the legal range.

Submit
156. The MAC address is 32 bits long.

Explanation

An Ethernet MAC address is a 48 bit address with the first 24 bits assigned to a specific organization by the IEEE, with the remaining bits left to the vendor’s discretion.

Submit
157. Although DNS is very powerful its domain names are limited in their length and structure. What three items below can they contain?

Explanation

Each DNS name is limited to 62 characters and may only contain letters, numbers, or a hyphen. Upper or lower case is not differentiated.

Submit
158. Which two items below are attributes that make TCP reliable?

Explanation

TCP is the choice for reliability whereas UDP is used for speed. The TCP header contains all of the items needed for reliably data communication. Some of the features that insure the reliability of TCP include: connection establishment, flow control, sequence numbers, and adaptive timeouts.

Submit
159. Which problems could result in the failure of the TELNET service?

Explanation

All the above could result in the Telnet not working properly.

Submit
160. Which of the following OSI layers is responsible for windowing?

Explanation

According to Cisco: The transport layer implements reliable internetwork data transport services that are transparent to upper layers. Transport-layer functions typically include flow control, multiplexing, virtual circuit management, and error checking and recovery. Flow control manages data transmission between devices so that the transmitting device does not send more data than the receiving device can process. Multiplexing enables data from several applications to be transmitted onto a single physical link. Virtual circuits are established, maintained, and terminated by the transport layer. Error checking involves creating various mechanisms for detecting transmission errors, while error recovery involves taking an action, such as requesting that data be retransmitted, to resolve any errors that occur.

Submit
161. What is the sequence of a normal TCP three-step handshake and four-step shutdown?

Explanation

Only in the first step of the three-step startup is the sequence number flag "SYN" flag set. The second step of the startup process is characterized by the use of the "ACK-SYN" flags. The final step sets the flag field to ACK. These steps are performed each time a TCP based program/service is initiated.

Submit
162. DNS not only does name resolution but also has the ability to load balance for fault tolerance. Which host-to-host protocols does it utilize for these functions?

Explanation

DNS is a distributed database that TCP/IP uses to convert names into IP addresses. DNS secondary servers act as backup and get their data from primary DNS servers. These zone transfers take place approximately every two to three hours. This process utilizes TCP for reliability, whereas DNS queries are performed through UDP for the benefit of speed.

Submit
163. In the tcpdump output shown below, what does the (0) indicate?
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

The (0) indicates that 0 data bytes were sent on the SYN connection.

Submit
164. Which OSI layer uses ports and sockets?

Explanation

Port numbers are also known as TCP port numbers. TCP functions on the Transport layer of the OSI model.

Submit
165. IP is highly capable at fragmenting data to fit the networks MTU. What flags are present in the fragmentation field to designate the last fragment in a series of frames?

Explanation

This field is used if IP must send a data package that is larger than allowed by the network access layer. The fragmentation field is a 2 byte field. Of these 16 bits, the 13 lowest bits are used for offset. The high order three bits are used for control. This includes the more bit. If the more bit is off and the offset is greater than zero, it means no more data will follow.

Submit
166. Presentation layer of the OSI model is responsible for what services?

Explanation

All of these services function at the Presentation layer. Presentation layer is responsible for ASCII, JPEG, MPEG, Graphics, images, multimedia, compression and encryption.

Submit
167. Which RFC has detailed specs on TCP?

Explanation

RFC's are Requests for Comments. RFC 793 details the operation of the TCP protocol.

Submit
168. At what layer of the TCP/IP stack can ICMP be found?

Explanation

Internet Control Messaging Protocol (ICMP) is used for diagnostics and to troubleshoot logical errors.

Submit
169. What is the maximum number of hops that a RIP update can travel through?

Explanation

The hop count specifies the number of routers in a path. RIP has a maximum hop count of 15. A count of 16 identifies a network or subnet as unreachable.

Submit
170. Which OSI layers map to the Network access layer of the DOD model?

Explanation

DOD model has 4 layers: Network access layer maps to Datalink and Physical layers of the OSI model; Internet layer maps to Network layer of OSI; Host-to-Host layer maps to Transport layer; Process/Application maps to Application, Presentation and Session layers of the OSI model.

Submit
171. An IP protocol field of 0x11 indicates IP is carrying which protocol as its payload?

Explanation

Common protocol numbers include 0x01 ICMP, 0x06 TCP, 0x11 UDP, and 0x58 IGRP. The protocol field acts much like a shipping label as it acts to identify who receives the contents of the IP datagram.

Submit
172. IPv4 default datagram size is how large (bytes)?

Explanation

The specifications for IPv4 set the default datagram size at 576 bytes.

Submit
173. Name two host-to-host protocols?

Explanation

The two primary host to host protocols consist of TCP and UDP. Their choice of usage will depend on user requirements.

Submit
174. What command is useful for reviewing the ICMP errors on the client's workstation?

Explanation

Netstat -s displays IP, UDP, TCP, and ICMP statistics. Netstat -r lists the devices routing table. Nslookup -icmp is a nonexistent command.

Submit
175. Which two of the following are routed protocols?

Explanation

IP and IPX are routed protocols RIP and OSPF are both routing protocols.

Submit
176. Which routing protocol makes a best path decision based on hops?

Explanation

RIP and RIP2 route to a target device by determining the shortest number of hops to the destination. Each router is considered one hop.

Submit
177. Which of the following Protocols operate on the Application and Presentation layer?

Explanation

SAP and NCP are application and presentation layer protocols.

Submit
178. Which services/protocols below operate on the Presentation layer?

Explanation

Encryption, ASCII and MPEG are presentation layer services. Some other presentation layer services are: JPEG, TIFF, GIF, PICT, and MIDI. The SQL and RPC operate on the session layer.

Submit
179. Which protocols and services are associated with the Transport layer?

Explanation

Transport layer is responsible for sequencing of packets in correct order, windowing, determining availability of communication, flow control, acknowledgement. TCP and UDP operate at this Layer.

Submit
180. Ethernet has an MTU of 1500. What is the MTU of IPv4?

Explanation

The total length field in the IP header is 2 bytes. With 2 bytes available, the total length of the IP header and all the data behind it can be a maximum of 65, 535 bytes.

Submit
181. Which two items below identify the first step of the three-step TCP startup?

Explanation

Two indicators identify the first step of a TCP start sequence a SYN flag and the MSS option. The MSS specifies the maximum amount of data to be transferred in each TCP segment.

Submit
182. Which two routing protocols do not support vlsm?

Explanation

Variable Length Subnet Masking (VLSM) allows each area of the network to have a different mask instead of having to share a common mask. This flexibility allows for better utilization of IP addresses. OSPF supports VLSM.

Submit
183. The OSI model of the Datalink layer does which of the following?

Explanation

Datalink layer includes Logical Link Control (LLC) sublayer and MAC sublayer. It is responsible for converting bits into frames. Bridges and Switches operate at Datalink layer.

Submit
184. What does an ICMP type 8, code 0 mean?

Explanation

ICMP type 3 messages are generated because of host unreachable problems. A code 0 specifies indicates the network is unreachable.

Submit
185. At what layer of the OSI model does network redirector operates?

Explanation

Redirector operates at the Presentation layer of the OSI model. Presentation layer is also responsible for compression and encryption.

Submit
186. What is the maximum hop count in IPv4?

Explanation

The TTL field of the IP header is 1 byte. With one byte available, the maximum number of hops is 255. This field acts as a lifetime control mechanism.

Submit
187. In the tcpdump output shown below, what does 62697789 represent?
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512

Explanation

not-available-via-ai

Submit
188. Which of the following Protocols operate on the Network layer?

Explanation

IP, ICMP and NetWare's IPX operate on the Network layer.

Submit
189. Which services/protocols below operate on the Application layer?

Explanation

HTTP, SNMP and X.400 mail are application layer services. Some other application layer services and protocols are: Telnet, FTP, WWW browsers, NFS, SMPT gateways.

Submit
190. Which two devices operate at the network interface layer of the TCP/IP model?

Explanation

The network interface layer of the TCP/IP model is equivalent to layers one and two of the OSI.

Submit
191. Name two IPv4 options.

Explanation

Depending on the application and its implementation, IP has several supported options. These include loose source routing, strict source routing, and record route. If the header length is greater that 20 bytes then options are present.

Submit
192. Name two protocols that reside at the Internet layer of the TCP/IP model?

Explanation

IP and ARP are to protocols that reside at the Internet layer of the TCP/IP model. RIP and SNMP are considered processes. TCP is located in the host-to-host layer.

Submit
193. Which services and protocols are associated with the Application layer?

Explanation

Application layer is responsible for interface between the computer and the user. Protocols that operate at this layer are: WWW, Telnet, FTP, SNMP, HTTP, MIME.

Submit
194. What does the TCP header checksum cover?

Explanation

The TCP checksum contains an error check for the TCP header and any data payload it is carrying. TCP is the choice for reliability and its header contains all of the items needed for reliability data communication.

Submit
195. Which services and protocols are associated with the Presentation layer?

Explanation

Presentation layer is responsible for translating data into understandable format for transmission. Data compression and encryption takes place at this layer. Redirector works at this layer. MIDI, JPEG, ASCII and multimedia are associated with Presentation layer.

Submit
196. Which of the following Protocols operate on the Transport layer?

Explanation

TCP,UDP, and NetWare’s SPX operate on the Transport layer.

Submit
197. At which layers of the OSI model do BROUTERS operate at?

Explanation

Brouter is a combination of Bridge and a router. Brouters operate at Datalink and Network Layers of the OSI model.

Submit
198. Which two of the following protocols are based on the Dijkstra algorithm?

Explanation

OSPF bases its routing decision on link state. This underlying process was developed around the Dijkstra algorithm.

Submit
199. Which organizations have developed the OSI model?

Explanation

The International Standards Organization (ISO) based in Geneva, Switzerland, and American National Standards Institute (ANSI) has developed the OSI model in 1974 in an effort to standardize network architecture.

Submit
200. Which of the following two are valid unicast MAC addresses

Explanation

The first byte of a unicast addresses is always an even value and those with an odd value are multicast addresses. MAC addresses are displayed in hex of which "f" is the highest legal value.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 09, 2011
    Quiz Created by
    Apalani
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Some top-level DNS domains are .com, .edu, and .mil
TCP is a connection-oriented protocol.
How many bits in a byte?
What is a MAC address?
IPv4 addresses are 6 bytes long?
UDP is a reliable protocol.
Two ways to terminate a TCP session are ICMP ...
Which is the IP address range for a Class A IP address range?
In IPv6, the broadcast address type is replaced ...
The maximum decimal value for a byte is 255.
Which is the IP address range for a Class B IP address range?
Which of the following is NOT a well-known domain?
Which layer does the Data Link use to locate hosts on the network?
A packet that is sent on an Ethernet link is known as a frame.
Which of the following is used for testing loopback?
If a TCP task sends a window size of zero, how much ...
The netmask tells a host what address bits ...
At what layer of the OSI model would a ROUTER operate at?
The client port, also known as an ephemeral ...
A value of 6 in the byte 9 of the IP header ...
The tcpdump output shown below is in hexadecimal.09:32:43.910000...
We would use a “Cross-Over” UTP cable type to be ...
Because TCP is full duplex both the client and ...
Servers use ephemeral ports:
Which is the IP address range for a Class C IP address range?
Which is the IP address range for a Class E IP address range?
Which port does DNS use?
The only IP protocols are ICMP, TCP, and UDP
The SYN bit signals the client's intention to:
When there are errors on the network, ICMP ...
A DNS server:
OSPF is link state protocols.
Which of the following best characterizes ICMP?
At what layer of the OSI model would a BRIDGE operate at?
What OSI layer is responsible for converting bits into frames?
UDP operates at what layer of OSI model?
Which of the following are NOT layers of the OSI model?
How many layers are in the OSI model?
Is a UDP checksum mandatory?
Which routing protocol makes a best path ...
A Class C address has:
In the tcpdump output shown below, what does ...
We would use a “Cross-Over” UTP cable type to be ...
Which of the following best characterizes TCP ...
Do ARP requests leave the subnet?
What 2 OSI layers are above and beneath the Network layer? (Choose 2)
RFC 2151 details several troubleshooting tools ...
The OSI model is often used to describe communications architectures.
Trusted or "well-known" port numbers are less than 1024.
The client sends a RESET to the server to ...
When tcpdump is displayed in hexadecimal you see ...
Which is the IP address range for a Class D IP address range?
Do the UDP and TCP protocols operate at the same ...
Telnet operates at what layer of the OSI model?
What is a function of a reliable transport layer connection?
The IP protocol field identifies:
We would use a “Cross-Over” UTP cable type to be ...
The length of a normal IPv4 header is 24 bytes?
Which host-to-host protocol is used for reliability?
The client port in the tcpdump output shown ...
Ports can have a value of 0 through 65,535.
The server port in the tcpdump output shown ...
Email and FTP work at which layer of the OSI model?
Compression takes place at what layer of the OSI model?
Which two ports are typically required for email functions?
What does the Address Resolution Protocol (ARP) do?
Hosts typically know how to route a packet using a default router.
The IP address 172.20.0.0 is in the Class B range of addresses.
Tcpdump "sniffs" packets from:
Which of the following is a broadcast MAC address?
When examining the headers of packets displayed ...
Which layer of the OSI model is responsible for translation of data?
What is the function of ARP?
Which two of the following are routing protocols?
A Class B address has 8 bits to represent the ...
The PUSH flag says to:
What layer of the OSI model is responsible for ...
FTP operates at what layer of the OSI model?
During the first and second step of the TCP ...
What happens when an ICMP message cannot be delivered?
What tool is useful for troubleshooting DNS?
A server port of UDP ...
The UNIX /etc/services file associates:
Active HUBs operate at which layer of the OSI model?
Inside the IP header is the protocol field. The ...
Which two ports are required for DHCP?
How does a host that has sent TCP data know that ...
Which TCP/IP protocol is associated with routing?
The maximum length of an IP header is 60 bytes?
Which RFC has detailed specs on UDP?
The field that is 9 bytes offset into the IP header is:
Which of the following is not reserved for private addressing?
Routing of IP is a function of which OSI layer?
TCP protocol operates at which layer of the OSI model?
At which layer of the OSI model does Frame Relay operate?
If a hacker monitors someone login to the ...
IP data is referred to as a packet; Ethernet ...
The tcpdump -s option can change the number of bytes collected.
The three-way handshake requires the following ...
The three parts of a TCP connection are typically:
Which are classifications of RFC documents?
What does ‘ping’ stand for?
What does the acronym OSI represent?
Musical Instrument Digital Interface (MIDI) ...
How many layers are in the TCP/IP model?
The tcpdump -x option dumps the record in hexadecimal.
If a tcpdump record is UDP, tcpdump will always ...
At which layer of the OSI model determines which ...
How many layers are in the DOD model?
The first step of the three-step handshake ...
If a TCP host has a MSS of 1024 and a current ...
How many bytes is a UDP header?
How many bytes in an IPv6 address?
While using your new protocol analyzer, you ...
Which RFC has detailed specs on IP?
In the tcpdump output shown below, what does 09:32:43:9100000...
What layer of the OSI model ensures that packets ...
TCP uses which field for flow control purposes?
At what layer of the OSI model would a REPEATER operate at?
A normal TCP header is 20 bytes long?
Which port would you block related to HTTP services?
What is the dotted decimal subnet mask ...
Joe has been using ping and has been ...
Ethernet announces ARP by placing a specific ...
An IP protocol field of 0x06 indicates IP is ...
An IP protocol field of 0x01 indicates IP is ...
One common UDP application is TFTP, what port does it use?
What does a router do?
TCP begins a connection with:
In the tcpdump output shown below, what does ...
In the tcpdump output shown below, what does the ...
What embedded protocol is used in the tcpdump ...
Server port numbers are typically:
Which is the IP address range for MULTICASTING?
Ports are used to identify applications and aid ...
What are ICMP type 5 used for?
IPv4 uses the TTL field to limit how may times ...
Normally, TCP utilizes a four-step shutdown. ...
What does DNS resolve to IP addresses?
Which two ports would you block related to FTP services?
What do TCP sequence numbers count? 
What does an ICMP type 3, code 3 mean?
A server response with the RESET and ACK flags ...
Which OSI layer uses data segments?
At which layer of the OSI model does SNMP operate?
Which RFC has detailed specs on the ICMP protocol?
Which OSI layer defines MediaPlayer standard?
What is the default value for the Max Segment ...
The range of well known ports is from?
Which RFC lists port and protocol numbers?
Does TFTP require authentication?
Which two of the following protocols are based ...
Which is not a rule applied to assigning IP addresses to hosts?
At which layer of the OSI model does NetBIOS operate?
While doing your daily capture of network ...
The MAC address is 32 bits long.
Although DNS is very powerful its domain names ...
Which two items below are attributes that make TCP reliable?
Which problems could result in the failure of the TELNET service?
Which of the following OSI layers is responsible for windowing?
What is the sequence of a normal TCP three-step ...
DNS not only does name resolution but also has ...
In the tcpdump output shown below, what does the ...
Which OSI layer uses ports and sockets?
IP is highly capable at fragmenting data to fit ...
Presentation layer of the OSI model is responsible for what services?
Which RFC has detailed specs on TCP?
At what layer of the TCP/IP stack can ICMP be found?
What is the maximum number of hops that a RIP ...
Which OSI layers map to the Network access layer of the DOD model?
An IP protocol field of 0x11 indicates IP is ...
IPv4 default datagram size is how large (bytes)?
Name two host-to-host protocols?
What command is useful for reviewing the ICMP ...
Which two of the following are routed protocols?
Which routing protocol makes a best path decision based on hops?
Which of the following Protocols operate on the ...
Which services/protocols below operate on the Presentation layer?
Which protocols and services are associated with the Transport layer?
Ethernet has an MTU of 1500. What is the MTU of IPv4?
Which two items below identify the first step of ...
Which two routing protocols do not support vlsm?
The OSI model of the Datalink layer does which of the following?
What does an ICMP type 8, code 0 mean?
At what layer of the OSI model does network redirector operates?
What is the maximum hop count in IPv4?
In the tcpdump output shown below, what does ...
Which of the following Protocols operate on the Network layer?
Which services/protocols below operate on the Application layer?
Which two devices operate at the network ...
Name two IPv4 options.
Name two protocols that reside at the Internet ...
Which services and protocols are associated with ...
What does the TCP header checksum cover?
Which services and protocols are associated with ...
Which of the following Protocols operate on the Transport layer?
At which layers of the OSI model do BROUTERS operate at?
Which two of the following protocols are based ...
Which organizations have developed the OSI model?
Which of the following two are valid unicast MAC addresses
Alert!

Advertisement