3DX5X Vol 2 Ure1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jen163352
J
Jen163352
Community Contributor
Quizzes Created: 1 | Total Attempts: 64
Questions: 36 | Attempts: 64

SettingsSettingsSettings
3DX5X Vol 2 Ure1 - Quiz


CDC URE FOR UNIT 1 IN VOLUME 2


Questions and Answers
  • 1. 

    What layers of the Open System Interconnect model defines the electrical, mechanical, procedual, and functional specifications for links between communicating network systems?

    • A.

      Physical

    • B.

      Data Link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    A. pHysical
    Explanation
    The Physical layer of the Open System Interconnect model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data, such as the type of cables used, the voltage levels, and the physical connectors. This layer ensures that the signals can be transmitted reliably between devices and establishes the physical connection between them.

    Rate this question:

  • 2. 

    The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link layers into what two sublayers?

    • A.

      High Level Data Link Control and Synchronous Data Link Control

    • B.

      Logical Link Control and Media Access Control

    • C.

      Distance Vector and Link State

    • D.

      RS-232 and RS-530

    Correct Answer
    B. Logical Link Control and Media Access Control
    Explanation
    The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for flow control, error control, and establishing connections between devices. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical media, such as Ethernet or Wi-Fi, and handles addressing and data transmission. These two sublayers work together to ensure reliable and efficient data communication between network devices.

    Rate this question:

  • 3. 

    At what Open System Interconnect layer do network switches and bridges operate?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    C. Data Link
    Explanation
    Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transmission of data between nodes on a network by providing error detection and correction, as well as controlling the flow of data. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN) and make decisions based on the destination address in the data link header. They are commonly used to connect multiple devices and create a network infrastructure.

    Rate this question:

  • 4. 

    At what Open System Interconnect layer do routers operate?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    A. Network
    Explanation
    Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing and forwarding data packets across different networks. Routers use IP addresses to determine the best path for data packets to reach their destination. They make decisions based on network layer information, such as IP addresses, to efficiently transmit data between different networks. Therefore, the correct answer is Network.

    Rate this question:

  • 5. 

    At what Open System Interconnect layer are common data compression and encryption schemes used?

    • A.

      Application

    • B.

      Session

    • C.

      Presentation

    • D.

      Transport

    Correct Answer
    C. Presentation
    Explanation
    Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. This layer is responsible for formatting, encrypting, and compressing data before it is transmitted over the network. By using compression, the size of the data is reduced, which helps to optimize network bandwidth. Encryption ensures the security and confidentiality of the data during transmission. Therefore, the Presentation layer is the correct layer where these schemes are commonly utilized.

    Rate this question:

  • 6. 

    What Open System Interconnect layer is closest to the end user?

    • A.

      Application

    • B.

      Session

    • C.

      Etiquette

    • D.

      Protocol

    Correct Answer
    A. Application
    Explanation
    The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with software applications and allows users to access network resources. Therefore, the Application layer is the correct answer in this case.

    Rate this question:

  • 7. 

    What is a formal set of rules and conventions that govern how computers exchange information over a network medium?

    • A.

      Specification

    • B.

      Standard

    • C.

      Etiquette

    • D.

      Protocol

    Correct Answer
    D. Protocol
    Explanation
    A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that devices can communicate effectively and efficiently by establishing a common language and set of rules for data exchange.

    Rate this question:

  • 8. 

    What topology defines the layout of a network's devices and media?

    • A.

      Physical

    • B.

      Logical

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    A. pHysical
    Explanation
    The correct answer is Physical because the layout of a network's devices and media refers to the physical arrangement of these components. This includes the physical placement of routers, switches, cables, and other hardware devices that make up the network infrastructure. The physical topology determines how these devices are connected and the overall structure of the network.

    Rate this question:

  • 9. 

    What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

    • A.

      Physical

    • B.

      Logical

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    B. Logical
    Explanation
    Logical topology refers to the way in which devices communicate and data is transmitted in a network, regardless of the physical layout. It defines the logical connections between devices, such as how data flows from one device to another. This includes concepts like bus, ring, mesh, and tree topologies. Unlike physical topology, which focuses on the physical arrangement of devices and cables, logical topology focuses on the abstract representation of how devices communicate and data is transmitted.

    Rate this question:

  • 10. 

    What topology consists of devices connested to a common, shared cable?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hyrid

    Correct Answer
    A. Bus
    Explanation
    The correct answer is Bus. In a bus topology, all devices are connected to a single cable called the bus. This cable acts as a shared communication medium, allowing devices to transmit and receive data. Each device on the bus listens to the data being transmitted and only accepts the data intended for it. It is a simple and inexpensive topology, but if the main cable fails, the entire network can be affected.

    Rate this question:

  • 11. 

    What topology consists of cable segments from each computer connected to a centralized component?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    C. Star
    Explanation
    The star topology consists of cable segments from each computer connected to a centralized component, usually a switch or a hub. In this topology, all the data traffic is routed through the central component, allowing for easy management and troubleshooting. Each computer has its own dedicated connection to the central component, ensuring that if one computer fails, it does not affect the rest of the network. This topology is commonly used in modern Ethernet networks.

    Rate this question:

  • 12. 

    What topology combines two or more different physical topologies in a single network?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    D. Hybrid
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that different sections of the network may be set up in different topologies, such as a combination of bus, ring, or star. This allows for more flexibility and scalability in the network design, as different topologies can be used to suit different needs or requirements.

    Rate this question:

  • 13. 

    Which network protocol had the Department of Defense chosen as its standard to govern the flow of information?

    • A.

      AppleTalk

    • B.

      NetBios Extended User Interface

    • C.

      Transport Control Protocol/Internet Protocol

    • D.

      Internertwork Packet Exxhange/ Sequenced Packet Exchange

    Correct Answer
    C. Transport Control Protocol/Internet Protocol
    Explanation
    The Department of Defense had chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of rules that govern how data is transmitted over the internet, ensuring reliable and efficient communication between devices. It is the foundation of the modern internet and is used by a wide range of devices and networks worldwide.

    Rate this question:

  • 14. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resulution Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    B. Address Resolution Protocol
    Explanation
    The correct answer is Address Resolution Protocol (ARP). ARP is a network layer protocol that is used to map an IP address to a corresponding Media Access Control (MAC) address. It is responsible for finding the MAC address of a device on the same local network, given its IP address. ARP allows devices to communicate with each other using their MAC addresses, which are unique identifiers assigned to each network interface. By resolving IP addresses to MAC addresses, ARP enables the delivery of data packets within a local network.

    Rate this question:

  • 15. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resulution Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    C. Reverse Address Resulution Protocol
    Explanation
    The Reverse Address Resolution Protocol (RARP) is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server, which then responds with the corresponding IP address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.

    Rate this question:

  • 16. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resulution Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    D. Internet Control Message Protocol
    Explanation
    The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging capabilities to help with troubleshooting. ICMP is used by network devices to send error messages and operational information, such as error reporting and network congestion notifications. It allows for the detection of network problems, measurement of network performance, and troubleshooting of network connectivity issues. ICMP messages are typically used by network administrators and diagnostic tools to identify and resolve network-related problems.

    Rate this question:

  • 17. 

    What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

    • A.

      Internet Protocol

    • B.

      User Datagram Protocol

    • C.

      Transmission Control Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    C. Transmission Control Protocol
    Explanation
    The correct answer is Transmission Control Protocol (TCP). TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors or loss. TCP uses a combination of acknowledgments, sequencing, and retransmissions to guarantee the reliable delivery of data over IP networks.

    Rate this question:

  • 18. 

    What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

    • A.

      File Transfer Protocol

    • B.

      Trivial File Transfer Protocol

    • C.

      Simple Mail Transfer Protocol

    • D.

      HyperText Transfer Protocol

    Correct Answer
    A. File Transfer Protocol
    Explanation
    File Transfer Protocol (FTP) is the correct answer because it is the application within TCP/IP that is specifically designed for sending and receiving files. FTP allows users to transfer files between a client and a server over a network. It provides a standard set of commands for accessing and manipulating files on remote servers. FTP is widely used for file sharing and is an essential tool for transferring large files or multiple files over the internet.

    Rate this question:

  • 19. 

    What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

    • A.

      Local Area Network

    • B.

      Wide Area Network

    • C.

      Virtual Private Network

    • D.

      Metropolitan Area Network

    Correct Answer
    B. Wide Area Network
    Explanation
    A wide area network (WAN) is the correct answer because it connects networks that are geographically separated over long distances, such as between cities, states, countries, or even globally. Unlike a local area network (LAN) that connects devices within a limited area like a home or office, a WAN is designed to connect larger networks and enable communication between them. Virtual private networks (VPNs) are a type of network that uses encryption and tunneling protocols to provide secure connections over public networks, while metropolitan area networks (MANs) connect networks within a specific metropolitan area.

    Rate this question:

  • 20. 

    What type of network makes use of tunneling and security and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

    • A.

      Local Area Network

    • B.

      Wide Area Network

    • C.

      Virtual Private Network

    • D.

      Metropolitan Area Network

    Correct Answer
    C. Virtual Private Network
    Explanation
    A Virtual Private Network (VPN) makes use of tunneling and security protocols to enable a group of two or more computer systems to communicate over the public Internet. It creates a secure and encrypted connection between the systems, allowing them to share data and resources as if they were connected on a local network. VPNs are commonly used by businesses to provide remote access to their employees, ensuring secure communication and protecting sensitive information from unauthorized access.

    Rate this question:

  • 21. 

    Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

    • A.

      Port 80

    • B.

      Port 110

    • C.

      Port 443

    • D.

      Port 8080

    Correct Answer
    D. Port 8080
    Explanation
    Port 8080 is a common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. While port 80 is the standard port for HTTP, port 8080 is often used as an alternative port for HTTP servers and proxies. This is typically done to avoid conflicts with other services that may be using port 80. Therefore, port 8080 is commonly used to host web servers and proxy servers that handle HTTP traffic.

    Rate this question:

  • 22. 

    How many bits are in an IPv4 address?

    • A.

      16 bits

    • B.

      32 bits

    • C.

      64 bits

    • D.

      128 bits

    Correct Answer
    B. 32 bits
    Explanation
    An IPv4 address is a 32-bit number used to identify devices on a network. It is divided into four octets, with each octet represented by 8 bits. Therefore, the correct answer is 32 bits.

    Rate this question:

  • 23. 

    Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format

    • B.

      Dotted Decimal Notation

    • C.

      Hexadecimal

    • D.

      Octal

    Correct Answer
    B. Dotted Decimal Notation
    Explanation
    IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four sections, each separated by a dot. Each section represents an 8-bit binary number, which is then converted to its decimal equivalent. This format is easier for users to read and understand compared to binary or hexadecimal formats.

    Rate this question:

  • 24. 

     Using a range of 1-126 in the first octet of an IPv4 address, what class does it belong to?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    A. Class A
    Explanation
    An IPv4 address is divided into different classes based on the range of values in the first octet. Class A addresses have a range of 1-126 in the first octet. Therefore, an IPv4 address with a range of 1-126 in the first octet belongs to Class A.

    Rate this question:

  • 25. 

    What IPv4 class address is used for networks with about 250 nodes?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    A. Class C
    Explanation
    Class C addresses are used for networks with about 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, which allows for 256 possible network addresses and 254 possible host addresses. This class of addresses is commonly used for small to medium-sized networks, such as those found in homes, small businesses, or small organizations. Class D, E, and F addresses are not suitable for networks with about 250 nodes. Class D addresses are used for multicast addresses, Class E addresses are reserved for experimental purposes, and Class F addresses are reserved for future use.

    Rate this question:

  • 26. 

    What IPv4 class address is used for multicast addressing?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    B. Class D
    Explanation
    Class D IPv4 addresses are used for multicast addressing. Multicast addressing allows a sender to send a single packet to multiple recipients simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved for multicast group communication. These addresses are not assigned to specific devices but are used for multicast group membership.

    Rate this question:

  • 27. 

    What IPv4 reserved address is used for loop back?

    • A.

      0.0.0.0.

    • B.

      127.0.0.1.

    • C.

      207.55.157.255.

    • D.

      255.255.255.255.

    Correct Answer
    B. 127.0.0.1.
    Explanation
    The IPv4 reserved address used for loopback is 127.0.0.1. This address is commonly referred to as the loopback address and is used by a device to send network packets to itself. It is often used for testing and troubleshooting network connectivity on a local machine.

    Rate this question:

  • 28. 

    What is a mechanism that allows a network device to divide an IP address into a network and host number?

    • A.

      Subnet mask

    • B.

      Broadcast

    • C.

      Multicast

    • D.

      Subnet

    Correct Answer
    A. Subnet mask
    Explanation
    A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address belongs to the network and which part belongs to the host. By applying the subnet mask, the device can identify the network address and the host address, enabling proper routing and communication within the network.

    Rate this question:

  • 29. 

    What is the default classful subnet mask on class B networks?

    • A.

      255.255.0.0.

    • B.

      255.255.240.0.

    • C.

      255.255.255.0.

    • D.

      255.255.255.224.

    Correct Answer
    A. 255.255.0.0.
    Explanation
    The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for a network size of 16 bits and a host size of 16 bits, which means that the first two octets are used for the network portion of the address and the last two octets are used for the host portion. This allows for a maximum of 65,536 networks and 65,534 hosts per network.

    Rate this question:

  • 30. 

    What method borrows bits from the host field of an IP address to create a subnet?

    • A.

      Classful Subnet Masking

    • B.

      Classless Inter-Domain Routing

    • C.

      Virtual Private Networking

    • D.

      Virtual Local Area Networking

    Correct Answer
    B. Classless Inter-Domain Routing
    Explanation
    Classless Inter-Domain Routing (CIDR) is the method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more flexible and efficient allocation of IP addresses by allowing variable-length subnet masks. This means that instead of being limited to the fixed subnet masks used in classful subnet masking, CIDR allows for the creation of subnets with different sizes depending on the needs of the network. CIDR also enables the aggregation of IP addresses, reducing the size of routing tables and improving network efficiency.

    Rate this question:

  • 31. 

    Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format

    • B.

      Dotted Decial Notation

    • C.

      Hexadecimal

    • D.

      Octal

    Correct Answer
    A. Colon Hexadecimal Format
    Explanation
    IPv6 addresses are expressed in a colon hexadecimal format to make them more user-friendly. This format replaces consecutive zeros in the address with a double colon (::), making the address shorter and easier to read. Additionally, each segment of the address is represented in hexadecimal notation, which allows for a larger range of possible values and simplifies the addressing scheme. This format is designed to improve the usability and readability of IPv6 addresses compared to the binary representation used in IPv4.

    Rate this question:

  • 32. 

    What notation is expressed in leading zero compression of IPv6?

    • A.

      1234:1234:0:0:1234:0:0:1234.

    • B.

      10AB::3:0:1234:5678

    • C.

      255.255.255.255.

    • D.

      127.0.0.1.

    Correct Answer
    A. 1234:1234:0:0:1234:0:0:1234.
    Explanation
    The notation expressed in leading zero compression of IPv6 is the answer: 1234:1234:0:0:1234:0:0:1234. This is because leading zero compression allows consecutive blocks of zeros to be represented by double colons (::), reducing the length of the IPv6 address. In this case, the blocks of zeros between the numbers are compressed, resulting in a shorter and more concise representation of the address.

    Rate this question:

  • 33. 

    What notation is expressed in zero compression for IPv6?

    • A.

      1234:1234:0:0:1234:0:0:1234.

    • B.

      10AB::3:0:1234:5678

    • C.

      255.255.255.255

    • D.

      127.0.0.1.

    Correct Answer
    B. 10AB::3:0:1234:5678
    Explanation
    The correct answer is an IPv6 address expressed in zero compression notation. In IPv6, zero compression allows consecutive blocks of zeros to be represented with a double colon (::). This notation simplifies the representation of IPv6 addresses by eliminating consecutive blocks of zeros. The given answer, 10AB::3:0:1234:5678, follows this zero compression notation as it replaces two consecutive blocks of zeros with a double colon.

    Rate this question:

  • 34. 

    What Unicast address scope opertates within a network segment, and will not originate form, or be destined to, an interface that requires a router to direct traffic?

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregtable Local

    • D.

      Aggregatable Global

    Correct Answer
    A. Site-local
    Explanation
    Site-local addresses are used within a specific network segment and are not meant to be routed outside of that segment. They are unique within the site but not globally routable. This means that they will not originate from or be destined to an interface that requires a router to direct traffic. Site-local addresses were deprecated in 2004 and are no longer recommended for use.

    Rate this question:

  • 35. 

    What Unicast address scope is desiged to be private, internally routable addresses that do not route outside the site?

    • A.

      Site-local

    • B.

      Link-Local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    A. Site-local
    Explanation
    Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific organization or site and are not meant to be globally routable. They provide a way for devices within the same site to communicate with each other without the need for external routing. Site-local addresses were deprecated in favor of Unique Local Addresses (ULA) in IPv6.

    Rate this question:

  • 36. 

    What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different aresa allowing for hierarchical design and allocation?

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    D. Aggregatable Global
    Explanation
    Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible. In this scope, the Network ID portion of the address is broken up into different areas, allowing for hierarchical design and allocation. This means that the address can be divided into smaller subnets, making it more efficient for routing and allocation purposes.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 20, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 23, 2013
    Quiz Created by
    Jen163352
Back to Top Back to top
Advertisement