Do You Know About Computer Networking?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 2572 | Total Attempts: 9,338,474
Questions: 20 | Attempts: 266

SettingsSettingsSettings
Do You Know About Computer Networking? - Quiz

Sit back, relax and have fun with this Computer Networking quiz


Questions and Answers
  • 1. 

    What term refers to the source of data transmission over serial telecommunications links?

    • A.

      Local Area Network (LAN)

    • B.

      UART

    • C.

      Data Terminal Equipment (DTE)

    • D.

      Data Communications Equipment (DCE)

    Correct Answer
    C. Data Terminal Equipment (DTE)
    Explanation
    Data Terminal Equipment (DTE) refers to the source of data transmission over serial telecommunications links. DTE is the device that generates or consumes data and is responsible for initiating or terminating a communication session. It can be a computer, terminal, or any other device that communicates with another device over a serial connection. DTE devices are typically connected to Data Communications Equipment (DCE), which provides the physical interface and handles the actual transmission of data. UART (Universal Asynchronous Receiver/Transmitter) is a hardware component that facilitates serial communication between a computer and peripheral devices. Local Area Network (LAN) refers to a network that connects computers and devices within a limited area.

    Rate this question:

  • 2. 

    The AppleTalk protocol uses what access control method?

    • A.

      CSMA/CD

    • B.

      Token

    • C.

      Broadcast

    • D.

      CSMA/CA

    Correct Answer
    D. CSMA/CA
    Explanation
    The AppleTalk protocol uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) access control method. This method allows devices to sense the carrier (i.e., the medium) before transmitting data, and if the carrier is busy, they wait for a random period of time before attempting to transmit again. This helps to avoid collisions and ensures that data is transmitted reliably in a network using the AppleTalk protocol.

    Rate this question:

  • 3. 

    What are the two sublayers of the data-link layer of the OSI model?

    • A.

      IPX And SPX

    • B.

      LAPB And MPLS

    • C.

      MAC And LLC

    • D.

      TCP And IP

    Correct Answer
    C. MAC And LLC
    Explanation
    The correct answer is MAC and LLC. The data-link layer of the OSI model is responsible for transferring data between adjacent network nodes. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical medium and addressing of devices on the network. The Logical Link Control (LLC) sublayer is responsible for error control, flow control, and framing of data. Together, MAC and LLC work together to ensure reliable and efficient data transmission within a local area network.

    Rate this question:

  • 4. 

    What TCP port number is usually assigned as the FTP "control port"?

    • A.

      23

    • B.

      20

    • C.

      25

    • D.

      21

    Correct Answer
    D. 21
    Explanation
    The correct answer is 21. This is because TCP port 21 is typically assigned as the FTP "control port". The control port is used for sending commands and receiving responses between the FTP client and server. It is responsible for establishing and managing the control connection during an FTP session.

    Rate this question:

  • 5. 

    What flag is set in the first packet of a TCP three way handshake?

    • A.

      ACK

    • B.

      PSH

    • C.

      SYN

    • D.

      RST

    Correct Answer
    C. SYN
    Explanation
    In the first packet of a TCP three-way handshake, the SYN flag is set. The three-way handshake is a process used to establish a connection between two devices over a TCP/IP network. During this process, the initiating device sends a packet with the SYN flag set to the receiving device. This packet serves as a request to synchronize sequence numbers and initiate the connection. The receiving device then responds with a packet that has both the SYN and ACK flags set, indicating that it acknowledges the request and is willing to synchronize.

    Rate this question:

  • 6. 

    What Windows service provides NetBIOS name registration and resolution services?

    • A.

      Dynamic Host Configuration Protocol

    • B.

      Domain Name Service

    • C.

      Windows Internet Name Services

    • D.

      Internet Information Server

    Correct Answer
    C. Windows Internet Name Services
    Explanation
    Windows Internet Name Services (WINS) is a Windows service that provides NetBIOS name registration and resolution services. NetBIOS is a networking protocol used by Windows systems to share resources and communicate with each other. WINS allows Windows systems to register their NetBIOS names and resolve the names of other systems on the network. It helps in translating NetBIOS names to IP addresses, enabling proper communication between Windows systems. Therefore, WINS is the correct answer for this question.

    Rate this question:

  • 7. 

    What nonprofit corporation manages registration of IP addresses on the Internet in North America?

    • A.

      ARIN

    • B.

      IANA

    • C.

      IETF

    • D.

      ISOC

    Correct Answer
    A. ARIN
    Explanation
    ARIN (American Registry for Internet Numbers) is the correct answer because it is a nonprofit corporation that manages the registration of IP addresses in North America. ARIN allocates and assigns IP addresses to Internet service providers, organizations, and individuals in its region. It is responsible for ensuring the efficient and fair distribution of IP addresses and promoting the stable and secure operation of the Internet in North America.

    Rate this question:

  • 8. 

    What type of DNS record is known as a "alias" record?

    • A.

      A

    • B.

      MX

    • C.

      CNAME

    • D.

      PTR

    Correct Answer
    C. CNAME
    Explanation
    A CNAME record, also known as an "alias" record, is a type of DNS record that is used to create an alias or nickname for another domain name. It allows multiple domain names to be associated with the same IP address, making it easier to manage and update DNS settings. This is useful when a website needs to be accessed using different domain names or subdomains.

    Rate this question:

  • 9. 

    Signal degradation over a long cable run is called what?

    • A.

      Attenuation

    • B.

      Lost Bits

    • C.

      Kill Bits

    • D.

      Transmission

    Correct Answer
    A. Attenuation
    Explanation
    Attenuation refers to the loss of signal strength or quality over a long cable run. As the signal travels through the cable, it gradually weakens due to factors such as resistance, interference, and noise. This can result in a decrease in signal amplitude and clarity, leading to degraded transmission quality. Attenuation is a common issue in long-distance communication systems and can be mitigated through the use of signal amplifiers or by using higher quality cables.

    Rate this question:

  • 10. 

    What routing protocol allows Internet backbone routers to connect and share routes?

    • A.

      Static Routing

    • B.

      Routing Information Protocol

    • C.

      Internet Protocol

    • D.

      Border Gateway Protocol

    Correct Answer
    D. Border Gateway Protocol
    Explanation
    Border Gateway Protocol (BGP) is the correct answer because it is the routing protocol used by internet backbone routers to connect and share routes. BGP is designed to exchange routing information between different autonomous systems (AS) on the internet. It allows routers in one AS to learn and advertise routes to routers in other ASs, making it essential for connecting and coordinating the routing across the internet backbone.

    Rate this question:

  • 11. 

    BGP routing peers connect to each other via what TCP port number?

    • A.

      119

    • B.

      53

    • C.

      179

    • D.

      3389

    Correct Answer
    C. 179
    Explanation
    BGP routing peers connect to each other via TCP port number 179. BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems on the internet. TCP (Transmission Control Protocol) is a reliable transport protocol that ensures the delivery of data packets. By using port number 179, BGP peers establish a TCP connection to exchange routing updates and maintain a consistent view of the network topology.

    Rate this question:

  • 12. 

    What communication method allows for transmission to all network peers simultaneously?

    • A.

      Transcast

    • B.

      Multicast

    • C.

      Unicast

    • D.

      Broadcast

    Correct Answer
    D. Broadcast
    Explanation
    Broadcast is the correct answer because it is a communication method that allows for transmission to all network peers simultaneously. In a broadcast, a single message is sent to all devices on the network, regardless of their location or membership in any specific group. This is useful when information needs to be shared with all connected devices, such as network-wide announcements or updates.

    Rate this question:

  • 13. 

    What network device restricts the expanse of a collision domain?

    • A.

      Switch

    • B.

      Hub

    • C.

      CSU/DSU

    • D.

      Modem

    Correct Answer
    A. Switch
    Explanation
    A switch is a network device that restricts the expanse of a collision domain. Unlike a hub, which broadcasts data to all connected devices, a switch creates individual collision domains for each port. This means that data sent from one device to another will only be received by the intended recipient, reducing the chances of collisions and improving network performance. A CSU/DSU is used for connecting to a digital communication line, and a modem is used for connecting to an analog communication line, neither of which restrict the collision domain like a switch does.

    Rate this question:

  • 14. 

    Which of the following protocols is "connectionless"?

    • A.

      UDP

    • B.

      SMTP

    • C.

      TCP

    • D.

      HTTP

    Correct Answer
    A. UDP
    Explanation
    UDP (User Datagram Protocol) is a connectionless protocol because it does not establish a dedicated connection before sending data. It is a simple and lightweight protocol that operates at the transport layer of the Internet Protocol Suite. Unlike TCP, UDP does not guarantee the delivery or ordering of packets, making it faster but less reliable. UDP is commonly used for applications that require fast transmission of data, such as streaming media, online gaming, and DNS.

    Rate this question:

  • 15. 

    Category 3 UTP cabling is rated for digital data transmission up to what speed?

    • A.

      16 Mpbs

    • B.

      4 Mbps

    • C.

      10 Mbps

    • D.

      100 Mbps

    Correct Answer
    C. 10 Mbps
    Explanation
    Category 3 UTP cabling is rated for digital data transmission up to 10 Mbps. This means that the maximum speed at which data can be transmitted through this type of cabling is 10 megabits per second.

    Rate this question:

  • 16. 

    What was the Unix protocol for sending files between two Unix computers on a network?

    • A.

      UUCP

    • B.

      LDAP

    • C.

      POP3

    • D.

      DNS

    Correct Answer
    A. UUCP
    Explanation
    UUCP (Unix-to-Unix Copy) was a protocol used for sending files between two Unix computers on a network. It allowed users to transfer files and execute commands remotely. UUCP was widely used before the advent of the internet and provided a reliable and efficient method for file transfer. LDAP (Lightweight Directory Access Protocol), POP3 (Post Office Protocol version 3), and DNS (Domain Name System) are all different protocols used for other purposes and not specifically designed for file transfer between Unix computers.

    Rate this question:

  • 17. 

    1000BaseCX networks use cabling made of what material?

    • A.

      Plastic Fiber

    • B.

      Nickel

    • C.

      Glass Fiber

    • D.

      Copper

    Correct Answer
    D. Copper
    Explanation
    1000BaseCX networks use cabling made of copper. Copper is commonly used in networking cables because it is a good conductor of electricity and allows for fast and reliable data transmission. Copper cables are also durable and can withstand the rigors of networking environments. Therefore, copper is the preferred material for cabling in 1000BaseCX networks.

    Rate this question:

  • 18. 

    Which of the following authentication protocols passes credentials in clear-text?

    • A.

      PAP

    • B.

      CHAP

    • C.

      LEAP

    • D.

      PEAP

    Correct Answer
    A. PAP
    Explanation
    PAP (Password Authentication Protocol) is the authentication protocol that passes credentials in clear-text. This means that the username and password are transmitted without any encryption, making it less secure compared to other protocols. This makes PAP vulnerable to eavesdropping and interception attacks, as the credentials can be easily captured and read by unauthorized individuals.

    Rate this question:

  • 19. 

    In what type of Ethernet network is passive termination most often used?

    • A.

      10BaseT

    • B.

      1000BaseT

    • C.

      10Base2

    • D.

      100BaseT

    Correct Answer
    C. 10Base2
    Explanation
    Passive termination is most often used in 10Base2 Ethernet networks. 10Base2, also known as Thinnet, uses coaxial cables with BNC connectors. Passive termination refers to the use of a resistor at the end of the cable to prevent signal reflections. This type of termination is commonly used in 10Base2 networks to ensure proper signal transmission and prevent data loss or interference.

    Rate this question:

  • 20. 

    Which of these is a common method of converting analog signals into digital?

    • A.

      Transforming

    • B.

      Pulse Code Modulation

    • C.

      Packet Assembler Disassembler

    • D.

      Multiplexing

    Correct Answer
    B. Pulse Code Modulation
    Explanation
    Pulse Code Modulation (PCM) is a common method of converting analog signals into digital. PCM involves sampling the analog signal at regular intervals and quantizing each sample into a discrete value. These discrete values are then represented as binary numbers, resulting in a digital representation of the original analog signal. PCM is widely used in telecommunications and audio applications for its ability to accurately reproduce analog signals in a digital format.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.