Intro To Networking Midterm Exam Prep

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Timlem
T
Timlem
Community Contributor
Quizzes Created: 1 | Total Attempts: 838
Questions: 106 | Attempts: 838

SettingsSettingsSettings
Intro To Networking Midterm Exam Prep - Quiz

Networking


Questions and Answers
  • 1. 

    When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?

    • A.

      PCs will attempt to use the last address assigned to them.

    • B.

      PCs will pull from a static address pool.

    • C.

      PCs will use APIPA

    • D.

      PCs will prompt the user for an address

    Correct Answer
    C. PCs will use APIPA
    Explanation
    When the DHCP server is unavailable for a network, PCs will attempt to configure their NICs using APIPA (Automatic Private IP Addressing). APIPA allows PCs to automatically assign themselves a private IP address within a specific range (169.254.0.1 to 169.254.255.254) when a DHCP server is not available. This allows the PCs to continue communicating on the network using a self-assigned IP address until the DHCP server becomes available again.

    Rate this question:

  • 2. 

    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

    • A.

      Coaxial

    • B.

      CAT3

    • C.

      CAT3

    • D.

      CAT5e

    Correct Answer
    D. CAT5e
    Explanation
    CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial and CAT3 cables are not capable of achieving this speed.

    Rate this question:

  • 3. 

    Which of the following remote access methods allows an administrator to take control of a user's machine and block the user from seeing the active session?

    • A.

      PPP

    • B.

      PPPoE

    • C.

      RDP

    • D.

      RAS

    Correct Answer
    C. RDP
    Explanation
    RDP (Remote Desktop Protocol) is a remote access method that allows an administrator to take control of a user's machine and block the user from seeing the active session. RDP provides a graphical interface for the administrator to access and control the user's desktop remotely. This can be useful for troubleshooting or performing tasks on the user's machine without interrupting their work or allowing them to see what is happening on their screen.

    Rate this question:

  • 4. 

    Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain?

    • A.

      Firewall

    • B.

      Bridge

    • C.

      Repeater

    • D.

      Router

    Correct Answer
    B. Bridge
    Explanation
    A bridge is a device that separates a LAN segment into two collision domains without affecting the broadcast domain. It does this by examining the MAC addresses of the frames passing through it and forwarding them only to the appropriate segment. By doing so, it reduces collisions and improves network performance within each segment. Unlike a router, a bridge operates at the data link layer of the OSI model and does not create separate broadcast domains. A firewall is a security device that filters network traffic, and a repeater simply amplifies and extends the signal.

    Rate this question:

  • 5. 

    At which of the following layers does the TCP protocol operate?

    • A.

      Layer 1

    • B.

      Layer4

    • C.

      Layer 6

    • D.

      Layer 7

    Correct Answer
    B. Layer4
    Explanation
    The TCP (Transmission Control Protocol) operates at Layer 4 of the OSI model, which is the Transport Layer. This layer is responsible for establishing and maintaining reliable end-to-end connections between hosts, ensuring the ordered and error-free delivery of data packets. TCP provides features like flow control, congestion control, and error detection to ensure reliable transmission of data over IP networks.

    Rate this question:

  • 6. 

    Which of the following applications is MOST likely to require QoS to ensure proper functionality?

    • A.

      HTTP

    • B.

      VoIP

    • C.

      SNMPv3

    • D.

      Peer to peer

    Correct Answer
    B. VoIP
    Explanation
    VoIP (Voice over Internet Protocol) is the most likely application to require Quality of Service (QoS) to ensure proper functionality. QoS is necessary for VoIP because it prioritizes and manages network traffic to provide a consistent and reliable voice communication experience. VoIP relies on real-time audio transmission, and any delay, jitter, or packet loss can significantly degrade call quality. QoS helps to prioritize VoIP traffic over other less time-sensitive data, ensuring that voice packets are delivered with minimal delay and maximum quality.

    Rate this question:

  • 7. 

    Which of the following ports does POP3 services use, by default?

    • A.

      25

    • B.

      110

    • C.

      143

    • D.

      443

    Correct Answer
    B. 110
    Explanation
    POP3 (Post Office Protocol version 3) is a protocol used for receiving email messages from a mail server. By default, POP3 services use port 110. This port is specifically designated for POP3 communication, allowing clients to connect to the mail server and retrieve their emails. Port 25 is used for SMTP (Simple Mail Transfer Protocol), which is responsible for sending emails. Port 143 is used for IMAP (Internet Message Access Protocol), another protocol for receiving emails. Port 443 is used for HTTPS (Hypertext Transfer Protocol Secure), which is a secure version of HTTP used for encrypted communication.

    Rate this question:

  • 8. 

    In which of the following layers of the OSI model does the TCP protocol operate?

    • A.

      Session

    • B.

      Network

    • C.

      Data link

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    The TCP protocol operates in the Transport layer of the OSI model. The Transport layer is responsible for ensuring reliable communication between end systems. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data packets. It handles the segmentation, reassembly, and flow control of data, ensuring that data is delivered accurately and efficiently.

    Rate this question:

  • 9. 

    A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

    • A.

      DHCP

    • B.

      ARP

    • C.

      DNS

    • D.

      PING

    Correct Answer
    B. ARP
    Explanation
    The Address Resolution Protocol (ARP) would provide the needed information. ARP is used to map an IP address to a MAC address on a local network. In this case, the network technician can use ARP to obtain the MAC address of the workstation with the IP address 192.168.1.45, which will help identify the workstation's packets in the packet analyzer.

    Rate this question:

  • 10. 

    A workstation is having connectivity issues when being added to the domain. Which of the following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation?

    • A.

      Ipconfig

    • B.

      Nslookup

    • C.

      Netstat

    • D.

      Nbtstat

    Correct Answer
    A. Ipconfig
    Explanation
    The correct answer is "Ipconfig." The Ipconfig command is used to display the IP configuration settings of a network interface on a Windows computer. By running the Ipconfig command, the administrator can view the DNS (Domain Name System) and WINS (Windows Internet Name Service) servers that are currently configured for the workstation. This information can help identify any connectivity issues related to the domain.

    Rate this question:

  • 11. 

    In order for computers with private IP addresses to access the public Internet, which of the following must the router perform?

    • A.

      NAT

    • B.

      BGP

    • C.

      DHCP

    • D.

      APIPA

    Correct Answer
    A. NAT
    Explanation
    The router must perform Network Address Translation (NAT) in order for computers with private IP addresses to access the public Internet. NAT allows the router to translate the private IP addresses of the computers into a single public IP address that can be recognized and routed on the Internet. This allows multiple devices on a private network to share a single public IP address, conserving IP address space and providing a level of security by hiding the private IP addresses from the public network.

    Rate this question:

  • 12. 

    A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?

    • A.

      Frequency settings should be changed

    • B.

      Additional WAPs should be installed

    • C.

      Channels should be changed

    • D.

      VLANs should be added

    Correct Answer
    B. Additional WAPs should be installed
    Explanation
    To allow the new employees access to the wireless network, additional WAPs (Wireless Access Points) should be installed. This is because the existing WAPs may not have enough coverage or capacity to accommodate the increased number of users. By installing additional WAPs, the network will be able to handle the increased demand and provide reliable and efficient wireless connectivity to all 50 new employees.

    Rate this question:

  • 13. 

    Which of the following is a secure method of remote access via command line?

    • A.

      RCP

    • B.

      Telnet

    • C.

      RSH

    • D.

      SSH

    Correct Answer
    D. SSH
    Explanation
    SSH (Secure Shell) is a secure method of remote access via command line. Unlike Telnet, RCP, and RSH, SSH provides encryption and authentication, ensuring that the connection between the client and the server is secure. It uses cryptographic techniques to protect the data transmitted over the network, making it a reliable and secure method for remote access and management of systems.

    Rate this question:

  • 14. 

    Which of the following protocols is commonly used for VoIP technology?

    • A.

      Telnet

    • B.

      SMTP

    • C.

      SIP

    • D.

      SNMP

    Correct Answer
    C. SIP
    Explanation
    SIP (Session Initiation Protocol) is commonly used for VoIP (Voice over Internet Protocol) technology. SIP is an application-layer protocol that establishes, modifies, and terminates multimedia sessions such as voice and video calls over IP networks. It is designed to enable communication between devices and applications in a flexible and scalable manner. Telnet is a remote login protocol, SMTP is an email protocol, and SNMP is a network management protocol, none of which are directly related to VoIP technology.

    Rate this question:

  • 15. 

    Which of the following protocols can be found at the application layer?

    • A.

      Telnet

    • B.

      TCP

    • C.

      SNMP

    • D.

      UDP

    Correct Answer
    A. Telnet
    Explanation
    Telnet is a protocol that operates at the application layer. It allows a user to remotely access and control a device or computer over a network. This protocol provides a virtual terminal session, allowing users to interact with the remote device as if they were physically present. Telnet is commonly used for remote administration, troubleshooting, and configuring network devices. Unlike TCP and UDP, which operate at the transport layer, Telnet is specifically designed for application layer communication. SNMP (Simple Network Management Protocol) is also an application layer protocol, but the correct answer is Telnet.

    Rate this question:

  • 16. 

    Which of the following processes translates a private IP address for a public IP address?

    • A.

      NAT

    • B.

      DNS

    • C.

      DHCP

    • D.

      PAT

    Correct Answer
    A. NAT
    Explanation
    NAT (Network Address Translation) is the process that translates a private IP address to a public IP address. It allows multiple devices on a private network to share a single public IP address when communicating with devices on the internet. NAT modifies the IP header of outgoing packets, replacing the private IP address with the public IP address, and vice versa for incoming packets, enabling communication between the private and public networks. DNS (Domain Name System) is responsible for translating domain names to IP addresses, DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network, and PAT (Port Address Translation) is a variant of NAT that translates both IP addresses and port numbers.

    Rate this question:

  • 17. 

    Which of the following logical network topologies is used to provide a secure connection across the Internet?

    • A.

      VLAN

    • B.

      Peer to Peer

    • C.

      VTP

    • D.

      VPN

    Correct Answer
    D. VPN
    Explanation
    A VPN (Virtual Private Network) is used to provide a secure connection across the Internet. It creates a private network over a public network, such as the Internet, allowing users to securely access and transmit data. VPNs use encryption and tunneling protocols to ensure that data is protected and secure from unauthorized access. This makes VPNs an ideal choice for organizations or individuals who need to connect to a network remotely while maintaining privacy and security.

    Rate this question:

  • 18. 

    An administrator replaced a router with a switch. End users are able to access network shares but are not able to access the Internet. Which of the following is the BEST explanation why the users are unable to access the Internet?

    • A.

      Router routes traffic between different networks and a switch does not

    • B.

      The new switch is faulty and needs to be replaced and configured correctly

    • C.

      The firewall needs to be setup to allow traffic to reach the Internet

    • D.

      The switch needs to be setup to forward data traffic to the Internet

    Correct Answer
    A. Router routes traffic between different networks and a switch does not
    Explanation
    A switch is a networking device that connects devices within a local network, while a router is responsible for routing traffic between different networks. In this scenario, the administrator replaced the router with a switch, which means that the switch is not capable of routing traffic between the local network and the Internet. Therefore, the users are unable to access the Internet because the switch does not have the functionality to route traffic to the Internet.

    Rate this question:

  • 19. 

    Which of the following is a hybrid network topology used for fault tolerance, in which all computers MUST connect to each other?

    • A.

      Star

    • B.

      Ring

    • C.

      Bus

    • D.

      Mesh

    Correct Answer
    D. Mesh
    Explanation
    A mesh network topology is a type of network configuration where each computer or device is connected to every other device in the network. This ensures fault tolerance as if one connection fails, there are multiple alternate paths for data transmission. This redundancy provides high reliability and fault tolerance, making mesh topology suitable for critical systems where uninterrupted connectivity is crucial.

    Rate this question:

  • 20. 

    Which of the following cable types is intended to be used on short distances and is immune to any type of interference?

    • A.

      Singlemode fiber

    • B.

      Multimode fiber

    • C.

      Shielded twisted pair

    • D.

      Unshielded twisted pair

    Correct Answer
    B. Multimode fiber
    Explanation
    Multimode fiber is the correct answer because it is designed to be used on short distances and is immune to any type of interference. Unlike singlemode fiber, which is better suited for longer distances, multimode fiber allows multiple light rays to travel simultaneously through the core, resulting in higher data transmission rates. Additionally, multimode fiber is less susceptible to interference compared to shielded twisted pair and unshielded twisted pair cables, which are commonly used for Ethernet connections.

    Rate this question:

  • 21. 

    The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the following connectivity issues did the technician discover?

    • A.

      Open pairs

    • B.

      Attenuation

    • C.

      Crosstalk

    • D.

      Interference

    Correct Answer
    A. Open pairs
    Explanation
    The technician discovered open pairs connectivity issues. Open pairs refer to a situation where one or more wires in a cable are cut or disconnected, resulting in a loss of connectivity. In this case, one of the wires in the CAT5 cable is cut in half, causing a break in the connection and leading to connectivity issues.

    Rate this question:

  • 22. 

    An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?

    • A.

      Layer 1

    • B.

      Layer 4

    • C.

      Layer 5

    • D.

      Layer 7

    Correct Answer
    A. Layer 1
    Explanation
    The problem most likely resides at Layer 1, the physical layer. This is because the administrator is unable to ping the default gateway, indicating a connectivity issue at the lowest level of the network stack. Layer 1 deals with the physical transmission of data, such as cables, connectors, and network interface cards. If the default gateway cannot be pinged, it suggests a problem with the physical connection between the administrator's device and the gateway.

    Rate this question:

  • 23. 

    What information can the Netstat command line utility provide?

    • A.

      Verify local and remote connectivity

    • B.

      Identifies all the routers between your system and a remote destination system

    • C.

      Displays all IP address configuration information

    • D.

      Displays all open connections along with protocols and ports used

    Correct Answer
    D. Displays all open connections along with protocols and ports used
    Explanation
    The Netstat command line utility can provide information about all open connections on a system, including the protocols and ports being used. This can be useful for troubleshooting network connectivity issues or identifying any unauthorized connections. It does not verify local and remote connectivity, identify routers, or display IP address configuration information.

    Rate this question:

  • 24. 

    Other than segmentation what other service do both TCP and UDP provide for the upper layer protocols?

    • A.

      Acknowledgements of received segments

    • B.

      Establish sessions

    • C.

      Provide connectionless service

    • D.

      Provide service addressing

    • E.

      All of the above

    Correct Answer
    D. Provide service addressing
    Explanation
    Both TCP and UDP provide service addressing for the upper layer protocols. This means that they allow the upper layer protocols to identify the specific service or application that they want to communicate with on a remote host. This is important for establishing a connection and ensuring that the data is sent to the correct destination.

    Rate this question:

  • 25. 

    Where can a client system get an IP address and the associated information from? (choose 2)

    • A.

      DHCP server

    • B.

      DNS server

    • C.

      Network Administrator

    • D.

      Windows Domain Controller

    • E.

      IEEE OUI corporate assignment

    Correct Answer(s)
    A. DHCP server
    C. Network Administrator
    Explanation
    A client system can obtain an IP address and associated information from a DHCP server. DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses to client devices on a network. The DHCP server is responsible for managing and distributing IP addresses to client systems. Additionally, a network administrator can also provide an IP address and associated information manually to a client system if necessary.

    Rate this question:

  • 26. 

    L2TP and PPTP are protocols associated with what service?

    • A.

      Web

    • B.

      Email

    • C.

      File transfer

    • D.

      VPN

    Correct Answer
    D. VPN
    Explanation
    L2TP (Layer 2 Tunneling Protocol) and PPTP (Point-to-Point Tunneling Protocol) are both protocols that are commonly used in VPN (Virtual Private Network) services. VPNs allow users to securely connect to a private network over a public network, such as the internet. L2TP and PPTP are used to establish and maintain the secure tunnel between the user's device and the VPN server, ensuring that data transmitted over the connection remains encrypted and protected from unauthorized access. Therefore, the correct answer is VPN.

    Rate this question:

  • 27. 

    Which secure command line utility is used for remote management of a cisco router or switch?

    • A.

      Telnet

    • B.

      SSH

    • C.

      RDP

    • D.

      CISC

    Correct Answer
    B. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it is a secure command line utility used for remote management of a Cisco router or switch. Telnet is not secure as it transmits data in plain text, making it vulnerable to eavesdropping. RDP (Remote Desktop Protocol) is used for remote desktop access, not specifically for managing Cisco devices. CISC is not a command line utility or a protocol used for remote management.

    Rate this question:

  • 28. 

    What protocol does Microsoft clients employ for file transfers?

    • A.

      SFTP

    • B.

      SMB

    • C.

      TFTP

    • D.

      RDP

    Correct Answer
    B. SMB
    Explanation
    Microsoft clients employ the SMB (Server Message Block) protocol for file transfers. SMB is a network file sharing protocol that allows clients to access files, printers, and other resources on a network. It is commonly used in Windows operating systems to facilitate file sharing and remote access.

    Rate this question:

  • 29. 

    The PDU created at the Internet layer of the TCP/IP 4 layer model is called ___________________.

    • A.

      Data

    • B.

      A segment

    • C.

      A packet

    • D.

      A frame

    Correct Answer
    C. A packet
    Explanation
    The PDU created at the Internet layer of the TCP/IP 4 layer model is called a packet. This is because at the Internet layer, data is divided into smaller units called packets before being transmitted over the network. These packets contain the necessary information such as source and destination IP addresses, as well as the actual data being transmitted. Therefore, a packet is the correct term for the PDU created at the Internet layer.

    Rate this question:

  • 30. 

    At what layer does the TCP/IP protocol stack define the most protocols?

    • A.

      Application

    • B.

      Transport

    • C.

      Internet

    • D.

      Network Interface

    Correct Answer
    A. Application
    Explanation
    The TCP/IP protocol stack defines the most protocols at the Application layer. This layer is responsible for providing network services to applications and includes protocols such as HTTP, FTP, SMTP, and DNS. These protocols enable communication between different applications running on different devices over a network. The Transport layer, Internet layer, and Network Interface layer also define protocols, but the Application layer has the highest number of protocols defined within the TCP/IP protocol stack.

    Rate this question:

  • 31. 

    What command will display your cache of IP to MAC address name resolutions?

    • A.

      Arp -a

    • B.

      Route print

    • C.

      Ipconfig /all

    • D.

      Ping /?

    Correct Answer
    A. Arp -a
    Explanation
    The correct answer is "arp -a". The "arp -a" command displays the cache of IP to MAC address name resolutions. ARP (Address Resolution Protocol) is used to map an IP address to a MAC address on a local network. By using the "arp -a" command, you can view the current mapping of IP addresses to MAC addresses in your cache.

    Rate this question:

  • 32. 

    Given the following configuration information: IP address: 150.150.150.38 subnet mask: 255.255.255.0 default gateway: 150.150.150.1 DNS server: 150.150.150.10 Which of the following would you ping to verify that the DNS server was functioning normally?

    • A.

      Ping 255.255.255.0

    • B.

      Ping 150.150.150.10

    • C.

      Ping 127.0.0.1

    • D.

      Ping www.google.ca

    Correct Answer
    D. Ping www.google.ca
    Explanation
    To verify that the DNS server is functioning normally, you would ping the DNS server's IP address, which is 150.150.150.10. Pinging www.google.ca would not directly test the functionality of the DNS server as it would rely on the DNS server to resolve the domain name to an IP address before pinging it.

    Rate this question:

  • 33. 

    What IP helper protocol is used by both the Ping and Tracert utilities to perform their jobs?

    • A.

      ARP

    • B.

      DNS

    • C.

      ICMP

    • D.

      UDP

    Correct Answer
    C. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer. ICMP is used by both the Ping and Tracert utilities to perform their jobs. Ping uses ICMP Echo Request messages to check if a remote host is reachable, while Tracert uses ICMP Time Exceeded messages to trace the route packets take to reach a destination. ICMP is a network protocol that allows devices to send error messages and operational information about the network. It is commonly used for diagnostic and troubleshooting purposes in network communication.

    Rate this question:

  • 34. 

    What type of address is the following? 169.254.73.244 255.255.0.0

    • A.

      Public class B

    • B.

      IEEE OUI

    • C.

      Multicast

    • D.

      APIPA

    Correct Answer
    D. APIPA
    Explanation
    The given IP address 169.254.73.244 falls within the range of APIPA (Automatic Private IP Addressing) addresses. APIPA is a feature in Windows operating systems that allows devices to automatically assign themselves an IP address when they are unable to obtain one from a DHCP server. These addresses are typically used for local network communication and cannot be routed on the internet. Therefore, the correct answer is APIPA.

    Rate this question:

  • 35. 

    Which three of the following protocols are associated with email? (choose 3)

    • A.

      SNMP

    • B.

      HTTPS

    • C.

      NTP

    • D.

      SMTP

    • E.

      POP3

    • F.

      IMAP4

    Correct Answer(s)
    D. SMTP
    E. POP3
    F. IMAP4
    Explanation
    SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol version 3), and IMAP4 (Internet Message Access Protocol version 4) are all protocols associated with email. SMTP is responsible for sending emails from the client to the server, POP3 is used for retrieving emails from the server to the client, and IMAP4 is used for accessing and managing emails on a remote mail server. SNMP, HTTPS, and NTP are not directly related to email protocols.

    Rate this question:

  • 36. 

    Which of the following is a key rule concerning subnet masks?

    • A.

      The default is 255.0.0.0

    • B.

      The binary 1’s must all be together at the end of the address

    • C.

      The binary 0’ must all be together at the end of the address

    • D.

      The most significant bit must be 1 for all subnet masks

    Correct Answer
    C. The binary 0’ must all be together at the end of the address
    Explanation
    A key rule concerning subnet masks is that the binary 0's must all be together at the end of the address. This means that the subnet mask should consist of a continuous sequence of 1's followed by a continuous sequence of 0's. This rule is important because it helps to identify the network portion and the host portion of an IP address. The 1's represent the network portion, while the 0's represent the host portion. By following this rule, devices can determine which network an IP address belongs to and properly route the network traffic.

    Rate this question:

  • 37. 

    What does the tracert utility mostly help with?

    • A.

      Troubleshooting ICMP errors

    • B.

      Troubleshooting ARP broadcasting

    • C.

      Troubleshooting routers

    • D.

      Troubleshooting name resolution

    Correct Answer
    C. Troubleshooting routers
    Explanation
    The tracert utility is primarily used for troubleshooting routers. It helps in identifying the path taken by data packets from the source to the destination by sending out ICMP echo requests with incrementing TTL values. By analyzing the response time and the routers encountered along the way, network administrators can pinpoint any issues or bottlenecks in the network infrastructure. This makes tracert a valuable tool for diagnosing and resolving router-related problems.

    Rate this question:

  • 38. 

    Looking at the following address, identify what class address it is: 126.128.255.99 255.255.255.0

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    A. A
    Explanation
    The given IP address 126.128.255.99 falls within the range of Class A addresses. In Class A, the first octet is used to identify the network, while the remaining three octets are used for host addresses. The range for Class A addresses is from 1.0.0.0 to 126.0.0.0. Therefore, based on the given IP address, it can be concluded that it belongs to Class A.

    Rate this question:

  • 39. 

    What is required to make sense of an IP address or to make it useful?

    • A.

      A MAC address

    • B.

      A DHCP server

    • C.

      A DNS server

    • D.

      A subnet mask

    Correct Answer
    D. A subnet mask
    Explanation
    A subnet mask is required to make sense of an IP address or to make it useful. A subnet mask is used to divide an IP address into network and host portions, allowing devices to determine if they are on the same network or if they need to communicate through a router. It helps in identifying the network address and the host address within a given IP address. Without a subnet mask, it would be difficult to determine the network boundaries and properly route the traffic.

    Rate this question:

  • 40. 

    How many bits is an IPv4 address?

    • A.

      8

    • B.

      32

    • C.

      64

    • D.

      128

    Correct Answer
    B. 32
    Explanation
    An IPv4 address is composed of 32 bits. This means that it is represented by a sequence of 32 binary digits (0s and 1s). Each bit in the address can have two possible values, 0 or 1, giving a total of 2^32 (or approximately 4.3 billion) unique addresses. This is the reason why IPv4 addresses are often referred to as 32-bit addresses.

    Rate this question:

  • 41. 

    It’s impossible for a system to communicate directly with a destination system that is on a different network. How can systems on different networks share information?

    • A.

      They work through the DNS server

    • B.

      They do it through a Microsoft/Unix/Linux network servers

    • C.

      They do it through their default gateways (local routers)

    • D.

      They are able to communicate directly using IP addresses instead of MAC addresses

    Correct Answer
    C. They do it through their default gateways (local routers)
    Explanation
    Systems on different networks share information by sending their data through their default gateways, which are local routers. These routers act as intermediaries, forwarding the data between the different networks. When a system wants to communicate with a destination on a different network, it sends the data to its default gateway, which then routes it to the appropriate destination network. This allows systems on different networks to communicate and share information effectively.

    Rate this question:

  • 42. 

    What does a system need before they can communicate directly with another system on the same network?

    • A.

      System name

    • B.

      The destination system subnet mask

    • C.

      DNS server IP

    • D.

      Destination MAC address

    Correct Answer
    D. Destination MAC address
    Explanation
    Before a system can communicate directly with another system on the same network, it needs the destination MAC address. The MAC address is a unique identifier assigned to each network interface card (NIC) and is used to identify and communicate with specific devices on a local network. By knowing the destination MAC address, a system can send data packets directly to the intended recipient on the same network.

    Rate this question:

  • 43. 

    Logical addressing today is pretty much exclusively represented by ___________________.

    • A.

      MAC address

    • B.

      IP address

    • C.

      HTTP address

    • D.

      ARP address

    Correct Answer
    B. IP address
    Explanation
    Logical addressing today is pretty much exclusively represented by IP address. This is because IP (Internet Protocol) address is used to identify and locate devices within a network. It provides a unique numerical label to each device, allowing them to communicate and exchange data over the internet. MAC address is a hardware address used at the data link layer, HTTP address is a protocol used for web communication, and ARP address is used for mapping IP addresses to MAC addresses. However, when it comes to logical addressing, IP address is the primary and widely used method.

    Rate this question:

  • 44. 

    Who would the following destination MAC address be sent to by a switch? FF:FF:FF:FF:FF:FF

    • A.

      Only the default gateway (local router)

    • B.

      The world

    • C.

      Everyone on the local network

    • D.

      To the special group of devices associated with that multicast address

    Correct Answer
    C. Everyone on the local network
    Explanation
    The destination MAC address FF:FF:FF:FF:FF:FF is the broadcast address, which means it is sent to all devices on the local network. Broadcast messages are intended to be received by every device on the network, so the switch would forward this message to everyone on the local network.

    Rate this question:

  • 45. 

    How many bytes is a MAC address?

    • A.

      3

    • B.

      6

    • C.

      24

    • D.

      48

    Correct Answer
    B. 6
    Explanation
    A MAC address is a unique identifier assigned to network interfaces for communications on a network. It consists of 6 bytes or 48 bits. Each byte is represented by 2 hexadecimal digits, resulting in a total of 12 characters when written in the standard format. Therefore, the correct answer is 6.

    Rate this question:

  • 46. 

    MAC or physical addresses are divided into two parts. The second part is just a unique number assigned to each component coming off the assembly line. The first part of the MAC is known as the OUI and is used for which of the following?

    • A.

      Over or Under Input field (used for local or remote communications)

    • B.

      Organization unique identifier (to identify the manufacturer of the component)

    • C.

      IEEE standards number (to indicate the standard - Ethernet for example)

    • D.

      To identify whether the number that follows is to be a unicast, multicast or broadcast

    Correct Answer
    B. Organization unique identifier (to identify the manufacturer of the component)
    Explanation
    The first part of the MAC address, known as the OUI (Organization Unique Identifier), is used to identify the manufacturer of the component. It is a unique number assigned to each component coming off the assembly line, allowing the identification of the manufacturer. This information is useful in various networking scenarios, such as troubleshooting, inventory management, and ensuring compatibility between different components.

    Rate this question:

  • 47. 

    The media access method used by Ethernet networks is ___________________.

    • A.

      CSMA/CA

    • B.

      CSMA/CD

    • C.

      Token passing

    • D.

      802.3au

    Correct Answer
    B. CSMA/CD
    Explanation
    CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is the media access method used by Ethernet networks. In CSMA/CD, devices on the network listen to the medium before transmitting data. If the medium is idle, the device can transmit. However, if two devices transmit at the same time and a collision occurs, both devices detect the collision and stop transmitting. They then wait for a random amount of time before retransmitting, reducing the chances of another collision. This method allows for efficient sharing of the network medium among multiple devices.

    Rate this question:

  • 48. 

    The ISO defined the OSI model to create a standardized approach to network communications and break up the process into clearly defined steps. The layered approach allowed for modular engineering and multi-vendor interoperability. How many layers were defined in the OSI model?

    • A.

      1

    • B.

      4

    • C.

      6

    • D.

      7

    • E.

      10

    Correct Answer
    D. 7
    Explanation
    The OSI model defined seven layers in order to create a standardized approach to network communications. This layered approach allowed for modular engineering and multi-vendor interoperability. Each layer has its own specific function and interacts with the layers above and below it in a hierarchical manner. By breaking up the process into clearly defined steps, the OSI model provides a framework for understanding and troubleshooting network communication.

    Rate this question:

  • 49. 

    Given the following results of the route print command what can you tell about the client system the command was run on?

    • A.

      It is part of a Class B network

    • B.

      It has 2 network cards installed

    • C.

      It has a misconfigured IP address

    • D.

      It cannot communicate with anyone beyond its local network

    Correct Answer
    D. It cannot communicate with anyone beyond its local network
    Explanation
    Based on the given results of the route print command, it can be inferred that the client system has a misconfigured IP address. This is because the statement "It cannot communicate with anyone beyond its local network" suggests that the system is unable to establish connections outside of its local network, indicating a problem with its IP address configuration.

    Rate this question:

  • 50. 

    The ____________ protocol provides error messaging for IP communications as well as a handy echo request / reply mechanism used by the ping utility to verify connectivity on the network.

    • A.

      OSPF

    • B.

      ICMP

    • C.

      ARP

    • D.

      IGMP

    Correct Answer
    B. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer. ICMP is a protocol that provides error messaging for IP communications. It is also used by the ping utility to send echo request messages and receive echo reply messages, which helps in verifying connectivity on the network. The ping utility sends an ICMP echo request message to a destination IP address and waits for an ICMP echo reply message from the destination. This mechanism is commonly used to troubleshoot network connectivity issues.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 07, 2018
    Quiz Created by
    Timlem
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.