TCP/IP Practice Test Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 80,705
| Attempts: 19,418 | Questions: 46
Please wait...
Question 1 / 46
0 %
0/100
Score 0/100
1. Which of the following techniques will allow hosts on a private Intranet with private addresses to communicate with the Internet? 

Explanation

NAT (Network Address Translation) allows hosts on a private Intranet with private addresses to communicate with the Internet. NAT translates the private IP addresses of the internal network into a single public IP address when communicating with the Internet. This allows multiple devices on the private network to share a single public IP address, extending the limited number of available public IP addresses and enabling communication with the Internet.

Submit
Please wait...
About This Quiz
TCP/IP Practice Test Quiz - Quiz

In this advanced technological world, where everything is directly or indirectly linked to computers or smartphones, we have brought this TCP/IP practice test quiz to test your knowledge.... see moreThe quiz has multiple questions that will be useful to test your understanding and knowledge as well as to gain some more through this fun learning experience. So, are you ready and well-prepared for it? Let's go then! Best of luck!
. see less

2. Which of the following IP addresses is a class A number? 

Explanation

The IP address 126.1.1.1 is a class A number because it falls within the range of 1.0.0.0 to 126.255.255.255. Class A IP addresses have the first octet as the network portion and the remaining three octets as the host portion.

Submit
3. Which of the following default masks for the major class numbers is incorrect? 

Explanation

Class D mask 255.255.255.255 or /32 is incorrect because it is not a valid mask for any major class. Class D addresses are used for multicast purposes and do not have a network portion, hence they do not require a subnet mask. The correct mask for Class D addresses is 224.0.0.0.

Submit
4. Which of the following is not true about an IP address? 

Explanation

While IP addresses can be represented in hexadecimal format, they are more commonly represented in decimal format, especially for user readability. Hexadecimal representation is more common in technical contexts or when dealing with network configurations, but for most users and applications, IP addresses are presented in their decimal format, such as "192.168.1.1" for IPv4 addresses. Therefore, this statement is not true.

 

Submit
5. What is layer 5 of the OSI model?

Explanation

Layer 5 of the OSI model is called the Session layer. This layer is responsible for establishing, managing, and terminating sessions between applications. It provides services such as session establishment, synchronization, and checkpointing. The Session layer ensures that data is exchanged between applications in an orderly and controlled manner. It also handles session recovery in case of any interruptions or failures.

Submit
6. DHCP provides what benefit to an IP network?

Explanation

DHCP provides the benefit of assigning IP addresses, subnet masks, gateway, and other values to a host device in an IP network. This allows for automatic configuration of network settings, eliminating the need for manual configuration on each device. DHCP simplifies network administration and ensures that devices are properly connected and able to communicate within the network.

Submit
7. DNS simplifies user access to the network by providing?

Explanation

DNS (Domain Name System) simplifies user access to the network by resolving hostnames to IP addresses. Instead of remembering and typing in a series of numbers (IP address), users can simply type in a domain name (hostname) into their web browser. The DNS system then translates the hostname into the corresponding IP address, allowing the user to access the desired website or network resource. This eliminates the need for users to remember and manually enter IP addresses, making it easier and more convenient to access websites and network services.

Submit
8. Which of the following is not a feature of the TCP layer? 

Explanation

The TCP (Transmission Control Protocol) layer is responsible for establishing and maintaining a reliable connection between two devices over a network. It ensures that data packets are delivered in the correct order and without errors. The TCP layer also supports full-duplex communication, allowing data to be transmitted simultaneously in both directions. However, low overhead is not a feature of the TCP layer. Overhead refers to the extra data that is added to each packet for routing and error-checking purposes, and TCP has a relatively high overhead compared to other protocols.

Submit
9. What is the use of the Time To Live (TTL) field in the IP header?

Explanation

The TTL field in the IP header is used to limit the lifetime of an IP datagram and prevent indefinite looping of IP datagrams. Each time the datagram passes through a router, the TTL value is decremented by one. If the TTL value reaches zero, the datagram is discarded. This mechanism ensures that IP packets do not circulate indefinitely in the network and helps prevent congestion and unnecessary resource consumption.

Submit
10. What does the ARP (Address Resolution Protocol) do? 

Explanation

ARP (Address Resolution Protocol) is a protocol used in computer networks to map an IP address to a corresponding MAC address. It allows devices on the same network to communicate with each other using MAC addresses, which are unique identifiers assigned to network interface cards. When a device wants to send data to another device using its IP address, it uses ARP to determine the MAC address associated with that IP address. This mapping is stored in an ARP table, which is used for efficient data transmission within the network. Therefore, the correct answer is "Resolves IP addresses to MAC addresses."

Submit
11. Which of the following fields in the header of an IP packet will be decremented by one at each router? 

Explanation

The Time to Live (TTL) field in the header of an IP packet will be decremented by one at each router. The TTL field is used to prevent packets from circulating endlessly in a network. When a router receives a packet, it decrements the TTL value by one. If the TTL reaches zero, the router discards the packet and sends an ICMP Time Exceeded message back to the source. This mechanism ensures that packets do not continue to circulate indefinitely and helps prevent network congestion and routing loops.

Submit
12. Given the IP address 199.74.239.1 /24, what is the network number? 

Explanation

In the given IP address 199.74.239.1 with a subnet mask of /24, the /24 indicates that the first 24 bits are used for the network portion.

The binary representation of the first three octets (199.74.239) is:

199: 11000111

74: 01001010

239: 11101111

The network portion is the first 24 bits, so the network number is:

11000111.01001010.11101111 (in binary)

Converting this binary representation to decimal:

11000111 (binary) = 199 (decimal)

01001010 (binary) = 74 (decimal)

11101111 (binary) = 239 (decimal)

Therefore, the network number is 199.74.239.0 in CIDR notation /24.

Submit
13. What is binary 100011101101 equivalent to in Decimal?

Explanation

Binary 100011101101 is equivalent to the decimal number 2285.

Submit
14. Which of the following can be accomplished by the Ping utility? 

Explanation

The Ping utility can be used to verify IP layer connectivity between two endpoints. It sends a small packet of data to the destination IP address and waits for a response. If a response is received, it indicates that the IP layer connectivity between the two endpoints is functioning properly.

Submit
15. Which of the following are incorrect about a dynamic routing protocol? 

Explanation

Dynamic routing protocols are used by routers to automatically learn routes to destinations and reflect changes in the network topology. They rely on communication between routers and their neighbors to exchange routing information. Examples of dynamic routing protocols include OSPF, EIGRP, RIP, and BGP. TCP, UDP, DHCP, and ARP are not routing protocols but rather protocols used for other purposes in networking.

Submit
16. Which of the following are incorrect about the UDP layer? 

Explanation

The incorrect statement about the UDP layer is "No-Port Numbers". UDP does use port numbers to identify the source and destination ports for communication. Port numbers are essential for multiplexing and demultiplexing data packets at the transport layer. They help in distinguishing between different applications or services running on the same device.

Submit
17. Which of the following methods is not how a router can learn routes into its routing table? 

Explanation

Routers learn routes into their routing tables through various methods, including directly attached networks, dynamic routing protocols, and manually added static routes. However, routers do not learn routes through TCP/IP applications. TCP/IP applications are used for communication between devices on a network, but they do not provide routing information to routers. Therefore, the correct answer is "Through TCP/IP applications."

Submit
18. What are class D addresses used for?

Explanation

Class D addresses are used for multicast communication. Multicast allows a single sender to send data to a specific group of receivers simultaneously. This type of communication is efficient for applications such as streaming media, online gaming, and video conferencing, where data needs to be distributed to multiple recipients at the same time. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved specifically for multicast communication.

Submit
19. What is port 80 used for?

Explanation

Port 80 is typically used as the default destination port to access a web server. When a user wants to access a website, their browser sends a request to the web server on port 80. The web server then responds to the request and delivers the requested web page back to the user's browser. This port is specifically designated for web traffic and is commonly used for HTTP communication between clients and servers.

Submit
20. Which of the following components of the TCP/IP protocol stack are end-to-end layers (also known as host-to-host layers)? 

Explanation

TCP and UDP are considered end-to-end layers in the TCP/IP protocol stack because they provide the necessary protocols for communication between two hosts or end systems. ARP (Address Resolution Protocol) and IP (Internet Protocol) are network layer protocols that handle addressing and routing, but they do not directly facilitate end-to-end communication. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are transport layer protocols that establish connections, manage data transfer, and provide error checking and flow control, making them the appropriate layers for host-to-host communication.

Submit
21. Which component is unknown in an ARP request packet? 

Explanation

In an ARP request packet, the sender's hardware address and IP address are known because they are included in the packet. However, the target's hardware address is unknown in the ARP request packet. The purpose of the ARP request is to determine the target's hardware address by broadcasting the request to all devices on the network and waiting for the device with the matching IP address to respond with its hardware address.

Submit
22. What is a gratuitous ARP?

Explanation

A gratuitous ARP is when a host sends an ARP request to resolve its own IP address. This is typically done to update or validate the ARP cache of other devices on the network. By sending an ARP request with its own IP address, the host is essentially announcing its presence and ensuring that other devices have the correct mapping of its IP address to its MAC address in their ARP caches. This can help prevent connectivity issues and improve network performance.

Submit
23. What is the basic unit of data transfer across an IP internetwork? 

Explanation

The basic unit of data transfer across an IP internetwork is the IP Layer Packet. This packet contains the necessary information such as the source and destination IP addresses, as well as the data being sent. The IP Layer is responsible for routing and forwarding packets between different networks, making it the fundamental unit for data transfer in an IP network.

Submit
24. How does a device determine if an IP address is on its local network or a remote network?

Explanation

A device determines if an IP address is on its local network or a remote network by referring to its subnet mask with the IP address. The subnet mask helps the device identify the network portion and the host portion of the IP address. By comparing the IP address with the subnet mask, the device can determine if the destination IP address is within its local network or if it needs to forward the packet to the default gateway for routing to a remote network.

Submit
25. Which of the following is incorrect about ICMP? 

Explanation

When an ICMP packet is dropped, a new ICMP packet will not be generated. ICMP is a protocol that is carried in IP packets and is used for error notification between routers and hosts. It stands for the Internet Control Message Protocol. However, if an ICMP packet is dropped, it will not automatically generate a new ICMP packet.

Submit
26. Which fields in the header of the TCP packet identify the upper-layer applications (processes)? 

Explanation

The source and destination port numbers in the header of the TCP packet are used to identify the upper-layer applications or processes. These port numbers allow the TCP protocol to determine which application or process on the source and destination devices should receive the data. The source port number represents the application or process on the sending device, while the destination port number represents the application or process on the receiving device. By using these port numbers, TCP ensures that the data is correctly delivered to the intended application or process on both ends of the communication.

Submit
27. When traffic is fragmented passing through a router due to a smaller MTU size allowed, does the next hop router assemble that traffic if it's MTU size supports the original MTU size?

Explanation

When traffic is fragmented passing through a router due to a smaller MTU size allowed, the next hop router does not assemble that traffic even if its MTU size supports the original MTU size. The fragmentation and reassembly of packets is the responsibility of the sending and receiving hosts, not the routers in between. Therefore, the next-hop router does not have the capability to reassemble the fragmented traffic.

Submit
28. In a TCP 3-way handshake, what does a SYN, ACK message indicate?

Explanation

A SYN, ACK message in a TCP 3-way handshake indicates the second message of the handshake. In this step, the server acknowledges the client's SYN message and sends its own SYN message along with an ACK message. This indicates that the server is willing to establish a connection with the client. The client will then respond with an ACK message, completing the 3-way handshake and establishing a reliable connection between the client and the server.

Submit
29. Which of the following does not describe the IP packet delivery layer? 

Explanation

The IP packet delivery layer is responsible for delivering packets from the source to the destination. It operates in a connectionless manner, meaning that there is no established connection between the sender and receiver. It also follows a best-effort approach, where it tries its best to deliver packets but does not guarantee delivery or quality of service. Additionally, it is considered unreliable as it does not provide mechanisms for error detection or correction. However, the term "streaming" does not describe the IP packet delivery layer as it refers to a specific method of transmitting continuous data in real time.

Submit
30. 195.194.193.0/27 provides how many subnets (including the all 0 and 1s subnet)?

Explanation

The given IP address range 195.194.193.0/27 provides 8 subnets, including the all 0 and 1s subnet. This is because the /27 subnet mask allows for 32 IP addresses, but 2 of those addresses are reserved for the network address and the broadcast address. Therefore, there are 30 usable IP addresses, which can be divided into 8 subnets.

Submit
31. What is the range of unreserved IP ports?

Explanation

The range of unreserved IP ports is from 1024 to 65535. IP ports are used to identify specific processes or services running on a device connected to a network. The range from 1024 to 65535 is reserved for dynamic or private ports, which are available for use by any application or service. Ports below 1024 are considered well-known ports and are typically reserved for specific services like HTTP (port 80) or FTP (port 21). Ports above 65535 are not valid for use.

Submit
32. What does ARP perform?

Explanation

ARP (Address Resolution Protocol) performs the task of resolving a Layer 3 IP address to a Layer 2 MAC address. This is necessary because data is transmitted in packets over a network, and each packet needs to have both a source and destination MAC address. ARP allows devices on the same network to communicate by mapping the IP address to the corresponding MAC address, ensuring that packets are correctly delivered to the intended recipient.

Submit
33. Which of the following is incorrect about Route Aggregation? 

Explanation

Route aggregation is a technique used to decrease the number of routes in the routing table by summarizing contiguous blocks of specific routes. It does not slow down the process of routing table lookups on the router. Instead, it improves the efficiency of routing by reducing the size of the routing table and the time required for route lookup. Route aggregation is accomplished by configuring the routing protocol to advertise the summary route.

Submit
34. Which of the following are incorrect about stub areas and their variants in OSPF? 

Explanation

Stub areas are actually recommended when an area has a single exit point to the backbone area. This is because stub areas reduce the amount of routing information that needs to be maintained within the area, making the network more efficient. By blocking external routes, a stub area can rely on the default route provided by the backbone area, simplifying the routing process. Therefore, the statement that stub areas are not recommended when an area has a single exit point to the backbone area is incorrect.

Submit
35. Which of the following fields in the IP header identifies the type of data (payload) that the IP packet is carrying? 

Explanation

The Protocol Number field in the IP header identifies the type of data (payload) that the IP packet is carrying. This field specifies the protocol used in the data portion of the IP packet, such as TCP, UDP, ICMP, etc. By examining this field, the receiving device can determine how to process and interpret the data contained within the IP packet.

Submit
36. Which of the following is incorrect about the hello protocol used by OSPF?

Explanation

The hello protocol used by OSPF is indeed used in the formation of neighbor adjacency. The hello protocol is responsible for exchanging hello packets between OSPF routers to establish and maintain neighbor relationships. These hello packets contain information about the router's OSPF interfaces, priority, and other parameters necessary for neighbor discovery and formation of adjacencies. The hello protocol plays a crucial role in the OSPF routing process by facilitating the identification and communication between neighboring routers. Therefore, the statement that the hello protocol is not used in the formation of neighbor adjacency is incorrect.

Submit
37. Which of the following is incorrect about OSPF ?

Explanation

OSPF (Open Shortest Path First) is a link-state routing protocol that operates within an autonomous system (AS). An AS is a collection of networks under a common administration and is identified by an AS number. Therefore, the statement "An OSPF autonomous system is given an AS number" is correct.

Submit
38. Which of the following are not reliability mechanisms used by TCP? 

Explanation

The source and destination port numbers are not reliability mechanisms used by TCP. These port numbers are used to identify specific processes or services on a device, but they do not directly contribute to the reliability of the TCP connection. Reliability mechanisms in TCP include sequence numbers, which ensure that packets are received in the correct order, and acknowledgments, which confirm the successful receipt of packets. The Sliding Window Protocol is also used for flow control, ensuring that the sender does not overwhelm the receiver with too many packets at once.

Submit
39. Which of the following is incorrect about Variable-Length Subnetting (VLSM)? 

Explanation

The given answer states that the RFC on VLSM was published before the one on Standard Subnetting. However, this statement is incorrect. The RFC on Standard Subnetting was published before the one on VLSM. Standard Subnetting was introduced in RFC 950 in 1985, while VLSM was introduced in RFC 1812 in 1995.

Submit
40. What would the broadcast address for 22.22.22.64/27 be?

Explanation

The given IP address is 22.22.22.64/27. The /27 indicates that the first 27 bits of the IP address are the network address and the remaining 5 bits are for host addresses. In binary, the first 27 bits would be 00010110.00010110.00010110.01. To find the broadcast address, we need to change all the host bits to 1. So, the broadcast address would be 22.22.22.95, as it has the same network address (first 27 bits) but with all host bits set to 1.

Submit
41. Which of the following is incorrect about the traceroute utility? 

Explanation

The traceroute utility is used to trace the path taken by IP packets to a given destination. It does this by sending out a series of UDP packets with increasing TTL values. The TTL field in the IP header is used to determine the maximum number of hops (routers) that a packet can pass through before being discarded. Each router along the path decrements the TTL value by 1, and if the TTL reaches 0, the router discards the packet and sends an ICMP Time Exceeded message back to the source. Therefore, the statement "It uses TCP packets carried in an IP packet" is incorrect because traceroute uses UDP packets, not TCP packets.

Submit
42. How many IP addresses are available for devices on a network with a subnet mask of /25?

Explanation

A subnet mask of /25 means that the network has 25 bits for the network address and 7 bits for the host address. With 7 bits for the host address, there are 2^7 or 128 possible combinations. However, the first and last combinations are reserved for network address and broadcast address respectively, leaving 126 available IP addresses for devices on the network.

Submit
43. Which of the following is incorrect about OSPF with multiple areas? 

Explanation

Summary LSAs are used in OSPF to advertise routes from one area to another. When an ABR receives a Summary LSA, it creates a new Summary LSA and floods it into other areas. This allows the routes to be propagated across the entire OSPF autonomous system. Therefore, the statement that "Summary LSAs will not propagate across the entire OSPF autonomous system" is incorrect.

Submit
44. Which of the following data structures are not maintained by OSPF? 

Explanation

OSPF (Open Shortest Path First) is a link-state routing protocol that maintains several data structures to facilitate routing within an autonomous system. These include the Topology Table, which represents the network topology; the Link State Database (LSDB), which stores information about all links in the network; and the Neighbor Table, which maintains information about neighboring routers. However, OSPF itself does not maintain the Routing Table directly. The Routing Table is maintained by the OSPF routing process in conjunction with the underlying routing algorithm to determine the best paths to destination networks based on the information in the Link State Database. Therefore, Option D is the correct choice. Options A, B, and C are data structures maintained by OSPF.

Submit
45. Which of the following is incorrect about a routing protocol metric?

Explanation

Routing protocol metrics are used to determine the best path to a destination within a routing domain. However, metrics are specific to each routing protocol and are not directly comparable between different routing protocols. Therefore, metrics cannot be used to evaluate alternative routes learned by two different routing protocols (Option B). Options A, C, and D are correct statements about routing protocol metrics.

Submit
46. Which of the following is correct about the Designated Router (DR) in OSPF?

Explanation

In OSPF, the Designated Router (DR) is responsible for maintaining the link-state database and exchanging routing information with other routers in a broadcast or NBMA network. The DR is elected within each broadcast and NBMA network, not per area or per autonomous system. This ensures efficient communication within the network by reducing the number of adjacencies that need to be established. Therefore, the correct answer is "There will be one DR for every broadcast and NBMA network."

Submit
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): Mar 26, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 26, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Feb 28, 2011
    Quiz Created by
    Apalani
Cancel
  • All
    All (46)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which ...
Which of the following IP addresses is a class A number? 
Which of the following default masks for the major class numbers is...
Which of the following is not true about an IP address? 
What is layer 5 of the OSI model?
DHCP provides what benefit to an IP network?
DNS simplifies user access to the network by providing?
Which of the following is not a feature of the TCP layer? 
What is the use of the Time To Live (TTL) field in the IP header?
What does the ARP (Address Resolution Protocol) do? 
Which of the following fields in the header of an IP packet will be...
Given the IP address 199.74.239.1 /24, what is the network...
What is binary 100011101101 equivalent to in Decimal?
Which of the following can be accomplished by the Ping utility? 
Which ...
Which of the following are incorrect about the UDP layer? 
Which ...
What are class D addresses used for?
What is port 80 used for?
Which of the following components of the TCP/IP protocol stack are...
Which component is unknown in an ARP request packet? 
What is a gratuitous ARP?
What is the basic unit of data transfer across an IP...
How does a device determine if an IP address is on its local network...
Which of the following is incorrect about ICMP? 
Which fields in the header of the TCP packet identify the upper-layer...
When traffic is fragmented passing through a router due to a smaller...
In a TCP 3-way handshake, what does a SYN, ACK message indicate?
Which of the following does not describe the IP packet delivery...
195.194.193.0/27 provides how many subnets (including the all 0 and 1s...
What is the range of unreserved IP ports?
What does ARP perform?
Which of the following is incorrect about Route Aggregation? 
Which of the following are incorrect about stub areas and their...
Which of the following fields in the IP header identifies the type of...
Which of the following is incorrect about the hello protocol used by...
Which of the following is incorrect about OSPF ?
Which ...
Which...
What would the broadcast address for 22.22.22.64/27 be?
Which of the following is incorrect about the traceroute...
How many IP addresses are available for devices on a network with a...
Which of the following is incorrect about OSPF with multiple...
Which of the following data structures are not maintained by...
Which of the following is incorrect about a routing protocol...
Which ...
Alert!

Advertisement