Computer Networking Ultimate Quiz! Trivia

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cambronbill3
C
Cambronbill3
Community Contributor
Quizzes Created: 2461 | Total Attempts: 1,136,524
Questions: 20 | Attempts: 369

SettingsSettingsSettings
Computer Networking Ultimate Quiz! Trivia - Quiz

.


Questions and Answers
  • 1. 

    What network protocol is used to access information in the Windows directory service?

    • A.

      IMAP

    • B.

      NMAP

    • C.

      ODBC

    • D.

      LDAP

    Correct Answer
    D. LDAP
    Explanation
    LDAP (Lightweight Directory Access Protocol) is the correct answer because it is a network protocol specifically designed for accessing and managing information within a directory service, such as the Windows directory service. LDAP allows clients to query and modify directory entries, making it the appropriate protocol for accessing information in the Windows directory service. IMAP, NMAP, and ODBC are not network protocols used for directory service access, making them incorrect choices.

    Rate this question:

  • 2. 

    What is the amount of time that a DHCP server loans an IP address to a client?

    • A.

      DHCP Acknowledgement

    • B.

      DHCP Lease

    • C.

      DHCP Options

    • D.

      DHCP Window

    Correct Answer
    B. DHCP Lease
    Explanation
    A DHCP server loans an IP address to a client for a specific period of time, known as the DHCP lease. During this lease period, the client is allowed to use the assigned IP address. Once the lease expires, the client must renew the lease if it wants to continue using the same IP address. The DHCP lease duration can be configured by the network administrator and can vary depending on the network requirements.

    Rate this question:

  • 3. 

    Which type of protocol is used to share routes between autonomous systems?

    • A.

      Exterior Gateway Protocol (EGP)

    • B.

      Interior Gateway Routing Protocol

    • C.

      Interior Gateway Protocol (IGP

    • D.

      Routing Information Protocol (RIP)

    Correct Answer
    A. Exterior Gateway Protocol (EGP)
    Explanation
    Exterior Gateway Protocol (EGP) is the correct answer because it is the protocol used to share routes between autonomous systems. EGP is an inter-domain routing protocol that allows different autonomous systems to exchange routing information and determine the best path for data transmission between them. It is specifically designed for communication between routers in different autonomous systems, making it the appropriate choice for sharing routes between them. Interior Gateway Routing Protocol (IGRP) and Routing Information Protocol (RIP) are examples of interior gateway protocols used within a single autonomous system, while Interior Gateway Protocol (IGP) is a general term that encompasses all interior routing protocols.

    Rate this question:

  • 4. 

    How is enhanced category 5 cabling denoted in shorthand?

    • A.

      CAT5enhanced

    • B.

      CAT5E

    • C.

      ECAT5

    • D.

      EnhancedCAT5

    Correct Answer
    B. CAT5E
    Explanation
    Enhanced category 5 cabling is denoted in shorthand as CAT5E. This is because CAT5E stands for Category 5 Enhanced, indicating that it is an improved version of the standard CAT5 cable. The "E" signifies the enhanced capabilities and performance of the cable, which includes higher data transfer speeds and reduced crosstalk.

    Rate this question:

  • 5. 

    What command is issued when beginning an ESMTP connection with a mail server?

    • A.

      Rcpt To

    • B.

      Mail From

    • C.

      Ehlo

    • D.

      Helo

    Correct Answer
    C. Ehlo
    Explanation
    The correct answer is "Ehlo". When beginning an ESMTP (Extended Simple Mail Transfer Protocol) connection with a mail server, the "Ehlo" command is issued. This command is used to identify the client to the server and to initiate the ESMTP session. It allows the client to request extended features and capabilities from the server, such as authentication methods and supported extensions.

    Rate this question:

  • 6. 

    What is another term for "Ethernet Address"?

    • A.

      MAC Address

    • B.

      Network Address

    • C.

      IP Address

    • D.

      Logical Address

    Correct Answer
    A. MAC Address
    Explanation
    The correct answer is MAC Address. This term refers to the unique identifier assigned to a network interface card (NIC) by the manufacturer. It is used to identify devices on a local network and is essential for communication between devices. The MAC address is a 48-bit hexadecimal number, typically written in the format of six pairs of two-digit numbers separated by colons or hyphens.

    Rate this question:

  • 7. 

    Which IEEE standard defines Fast Ethernet?

    • A.

      802.1x

    • B.

      802.11

    • C.

      802.3u

    • D.

      802.16

    Correct Answer
    C. 802.3u
    Explanation
    IEEE standard 802.3u defines Fast Ethernet. This standard specifies the physical layer and the media access control (MAC) layer of Ethernet networks operating at a speed of 100 Mbps. Fast Ethernet is an improvement over the original Ethernet standard, which operated at 10 Mbps. The 802.3u standard allows for faster data transmission rates and is widely used in local area networks (LANs) for high-speed data transfer.

    Rate this question:

  • 8. 

    Which fiber optic cable connector type conforms to EIA/TIA standards?

    • A.

      ST

    • B.

      SMA

    • C.

      RC

    • D.

      Y

    Correct Answer
    A. ST
    Explanation
    The ST fiber optic cable connector type conforms to EIA/TIA standards.

    Rate this question:

  • 9. 

    Which governing body has defined and standardized Fibre Channel?

    • A.

      IEEE

    • B.

      IOC

    • C.

      IETF

    • D.

      ANSI

    Correct Answer
    D. ANSI
    Explanation
    ANSI, or the American National Standards Institute, is the governing body that has defined and standardized Fibre Channel. ANSI is responsible for developing and maintaining standards across various industries, including technology. In the case of Fibre Channel, ANSI has established the specifications and protocols that ensure compatibility and interoperability among different devices and systems using this high-speed data transfer technology.

    Rate this question:

  • 10. 

    What type of IPv4 packet is sent to the source if a destination is overly congested?

    • A.

      Try Again

    • B.

      Source Quench

    • C.

      Wait

    • D.

      Hold

    Correct Answer
    B. Source Quench
    Explanation
    When a destination is overly congested, a Source Quench packet is sent to the source. This packet is a type of ICMP (Internet Control Message Protocol) packet that informs the source to reduce the rate at which it is sending packets. By receiving this packet, the source can slow down its transmission and help alleviate the congestion in the network.

    Rate this question:

  • 11. 

    What is the mechanism that controls the rate of received data from a modem?

    • A.

      Hardware Buffer

    • B.

      Flow Control

    • C.

      Hold And Wait

    • D.

      Hello Packets

    Correct Answer
    B. Flow Control
    Explanation
    Flow control is the mechanism that controls the rate of received data from a modem. It ensures that the sender and receiver are synchronized in terms of data transmission. Flow control techniques like sliding window and stop-and-wait prevent data overflow and ensure that the receiver can handle the incoming data at a manageable rate. By regulating the flow of data, flow control helps to maintain reliable and efficient communication between the modem and the receiving device.

    Rate this question:

  • 12. 

    "H channel" is associated with what networking technology?

    • A.

      Frame Relay

    • B.

      T1

    • C.

      BRI-ISDN

    • D.

      DS-3

    Correct Answer
    C. BRI-ISDN
    Explanation
    The "H channel" is associated with BRI-ISDN (Basic Rate Interface Integrated Services Digital Network). BRI-ISDN is a digital telecommunications technology that allows for the transmission of voice and data over existing telephone lines. It consists of two B (bearer) channels and one D (delta) channel. The B channels carry voice or data, while the D channel is used for signaling and control information. The H channel, also known as the hybrid channel, is used for data transmission at a higher rate than the B channels, making it suitable for applications that require faster data transfer speeds.

    Rate this question:

  • 13. 

    What flag is set in the last packet of a three-way TCP handshake?

    • A.

      SYN, ACK

    • B.

      ACK

    • C.

      SYN

    • D.

      RST

    Correct Answer
    B. ACK
    Explanation
    In the last packet of a three-way TCP handshake, the flag that is set is the ACK (Acknowledgement) flag. This flag indicates that the receiving party has successfully received the initial SYN (Synchronize) flag and is ready to establish a connection. The ACK flag acknowledges the receipt of the SYN flag and allows the communication to proceed between the two parties.

    Rate this question:

  • 14. 

    What domain is used by DNS servers to resolve IP addresses to host names?

    • A.

      Master Zone

    • B.

      In-addr.arpa

    • C.

      Secondary Zone

    • D.

      Slave Zone

    Correct Answer
    B. In-addr.arpa
    Explanation
    DNS servers use the domain "In-addr.arpa" to resolve IP addresses to host names. This domain is used for reverse DNS lookups, where the IP address is used to find the corresponding host name. Reverse DNS lookups are commonly used for security purposes, such as identifying the source of network traffic or verifying the authenticity of an email sender.

    Rate this question:

  • 15. 

    What is a logical path through a network that is established automatically as needed?

    • A.

      Permanent Virtual Circuit (PVC)

    • B.

      Switched Virtual Circuit (SVC)

    • C.

      Virtual Local Area Network (VLAN)

    • D.

      Routing Loop

    Correct Answer
    B. Switched Virtual Circuit (SVC)
    Explanation
    A Switched Virtual Circuit (SVC) is a logical path through a network that is established automatically as needed. Unlike Permanent Virtual Circuits (PVCs) which are preconfigured and always active, SVCs are set up on-demand and torn down when no longer needed. This dynamic nature of SVCs allows for efficient utilization of network resources as the circuits are only established when there is a need for communication between two endpoints. Therefore, SVC is the correct answer for the given question.

    Rate this question:

  • 16. 

    What are the two modes of IPSec operation?

    • A.

      VPN And Network

    • B.

      Network And Packet

    • C.

      Secure And Insecure

    • D.

      Tunnel And Transport

    Correct Answer
    D. Tunnel And Transport
    Explanation
    IPSec (Internet Protocol Security) operates in two modes: Tunnel mode and Transport mode. Tunnel mode encapsulates the entire IP packet within a new IP packet, adding an extra layer of security. It is commonly used for site-to-site VPN connections. Transport mode, on the other hand, only encrypts the data portion of the IP packet, leaving the original IP header intact. It is typically used for host-to-host or end-to-end communication within a network. Therefore, the correct answer is "Tunnel And Transport".

    Rate this question:

  • 17. 

    A collection of protocols that work together as a group is called what?

    • A.

      Protocol Layers

    • B.

      Protocol Group

    • C.

      Protocol Suite

    • D.

      Protocol Bundle

    Correct Answer
    C. Protocol Suite
    Explanation
    A collection of protocols that work together as a group is called a protocol suite. This term refers to a set of protocols that are designed to work together to provide a complete networking solution. Each protocol in the suite performs a specific function, and together they enable communication between devices on a network. Examples of protocol suites include TCP/IP, which is the suite of protocols used on the internet, and OSI (Open Systems Interconnection), which is a conceptual framework for understanding and describing network protocols.

    Rate this question:

  • 18. 

    SMTP, HTTP and FTP operate at which layer of the OSI reference model?

    • A.

      Physical

    • B.

      Network

    • C.

      Data-Link

    • D.

      Application

    Correct Answer
    D. Application
    Explanation
    SMTP, HTTP, and FTP are all application layer protocols. The application layer is the top layer of the OSI reference model and is responsible for providing network services to user applications. These protocols are specifically designed to support email transfer (SMTP), web browsing (HTTP), and file transfer (FTP) respectively. They all operate at the application layer as they interact directly with user applications and provide services such as data formatting, encryption, and authentication.

    Rate this question:

  • 19. 

    What protocol can resolve an IP address if given a MAC address?

    • A.

      RARP

    • B.

      DNS

    • C.

      ICMP

    • D.

      APR

    Correct Answer
    A. RARP
    Explanation
    RARP (Reverse Address Resolution Protocol) is the correct answer because it is a protocol that can resolve an IP address if given a MAC address. RARP is used to obtain an IP address when the MAC address is known, which is the reverse process of what is typically done with ARP (Address Resolution Protocol). RARP allows a device to send a broadcast request with its MAC address, and a RARP server responds with the corresponding IP address.

    Rate this question:

  • 20. 

    What is a more secure option for securing wireless networks than WEP?

    • A.

      AirSnort

    • B.

      802.11

    • C.

      WPA

    • D.

      802.11g

    Correct Answer
    C. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is a more secure option for securing wireless networks than WEP (Wired Equivalent Privacy). WEP is an older encryption standard that has several vulnerabilities, making it easier for hackers to crack the encryption and gain unauthorized access to the network. WPA, on the other hand, provides stronger encryption and security features, making it more difficult for attackers to compromise the network. Therefore, WPA is a recommended option for enhancing the security of wireless networks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Cambronbill3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.