WXFG49L
  • 1. What is the main purpose of data transmission?
A) Preventing data loss
B) Sending and receiving data between devices.
C) Encrypting messages.
D) Increasing bandwidth.
  • 2. Why are communication protocols important?
A) They define rules for data exchange and ensure integrity
B) They compress files.
C) They allocate IP addresses.
D) They clean corrupted data.
  • 3. Which OSI layer ensures reliable delivery?
A) network
B) Transport
C) Data link
D) Physical
  • 4. What layer of the OSI model handles logical addressing and routing?
A) Network
B) Data link
C) Physical
D) Network
  • 5. Which protocol operates at the Application layer?
A) IP
B) TCP
C) Ethernet
D) HTTP
  • 6. How many layers does the OSI model have?
A) 6
B) 4
C) 7
D) 5
  • 7. The TCP/IP model has how many layers?
A) 5
B) 6
C) 7
D) 4
  • 8. The Network Access layer in TCP/IP combines which OSI layers?
A) Application and Transpor.
B) Data Link and Physical
C) Network and Transport.
D) Application and Presentation
  • 9. Encapsulation & De-Encapsulation What is data encapsulation?
A) Adding headers/trailers to data
B) Deleting packets.
C) Deleting packets.
D) Data encryption
  • 10. Which layer converts data into signals?
A) Physical
B) Session
C) Network
D) Data Link
  • 11. In the encapsulation process, which layer adds source and destination IP addresses?
A) Network
B) Physical
C) Data link
D) Session
  • 12. What does the Data Link layer add during encapsulation?
A) IP addresses
B) MAC hearders and trailers
C) Port numbers.
D) Protocol identifiers.
  • 13. What is the main purpose of ARP?
A) Translate domain names.
B) Check connectivity.
C) Assign IP addresses
D) Resolve IP to MAC adddresses.
  • 14. What does a computer send when it doesn't know a MAC address?
A) DNS Query
B) ARP Reques.
C) ICMP Echo
D) Ping Request
  • 15. ARP Spoofing is a.
A) Hardware failure.
B) Software update.
C) Man-in-the-middle attack.
D) DNS attack.
  • 16. ICMP Which command uses ICMP Echo Requests?
A) netstat
B) arp
C) ping
D) ipconfig
  • 17. Which ICMP message is used in Traceroute?
A) Assigning IP addresses
B) Time Exceeded
C) Determining paths for data
D) Configuring firewalls
  • 18. Which type of routing uses protocols like OSPF?
A) Physical Routing
B) Static Routing
C) ) Manual Routing
D) Dynamic Routing
  • 19. Which routing protocol is best for small networks?
A) BGP
B) RIP
C) OSPF
D) DHCP
  • 20. What does a routing table contain?
A) MAC addresses
B) DNS records
C) Encrypted passwords
D) Destination networks and next hops
  • 21. What is the purpose of a default gateway?
A) Forwards traffic to external networks
B) It converts MAC to IP
C) Assigns static routes
D) Encrypts data
  • 22. IP Addressing What type of address is 192.168.1.1?
A) ) Reserved multicast.
B) Loopback address
C) Private IPv4 address.
D) Public IPv6 address
  • 23. How many bits are in an IPv4 address?
A) 128
B) 8
C) 32
D) 64
  • 24. What is the loopback IP address?
A) 0.0.0.0
B) 192.168.0.1
C) 10.0.0.1
D) 127.0.0.1
  • 25. Which IP address class has a default subnet mask of 255.255.255.0?
A) Class C
B) Class B
C) Class A
D) Class D
  • 26. Subnetting What is the CIDR notation for 255.255.255.0?
A) /28
B) /26
C) /24
D) /27
  • 27. How many usable IPs are in a /26 subnet?
A) 16
B) 62
C) 8
D) 32
  • 28. What is the broadcast address of 192.168.1.0/26?
A) 192.168.1.63
B) B) 192.168.1.64
C) B) 192.168.1.62
D) B) 192.168.1.61
  • 29. VLSM (Variable Length Subnet Masking) VLSM allows.
A) Port translation
B) Different subnet sizes in the same network
C) Encryption by subnet
D) ) Same subnet size everywhere
  • 30. Which subnet mask is appropriate for 20 hosts?
A) /30
B) /27
C) /24
D) /28
  • 31. How many bits are in an IPv6 address?
A) 32
B) 128
C) 48
D) 64
  • 32. What format is used in IPv6?
A) Decimal
B) Hexadecimal
C) Octal
D) Binary
  • 33. Which of the following is a valid IPv6 address?
A) 10.0.0.1
B) 127.0.0.1
C) 2001:db8::1
D) 192.168.1.1
  • 34. Does IPv6 use subnet masks?
A) No, uses prefix notation
B) Yes
C) Sometimes
D) Only for private ips
  • 35. ools & Troubleshooting Which command shows current IP configuration?
A) netstat
B) tracert
C) Ping
D) ipconfig / ifconfig
  • 36. What does arp -a do?
A) Trace MAC addresses
B) Display ARP table
C) Display ARP cache
D) Show routing table
  • 37. traceroute is used to:
A) Check MAC addresses
B) Trace the path to a destination.
C) Resolve DNS
D) Encrypt packets
  • 38. What layer is responsible for user interaction in OSI?
A) Network
B) Transport
C) Application
D) Session
  • 39. Which protocol is used for error messages in IP networks?
A) ICMP
B) TCP
C) FTP
D) SMTP
  • 40. Ethernet works on which OSI layer?
A) Physical only
B) Transport
C) Data link
D) Network
  • 41. What is the role of the Transport layer?
A) Encrypt data
B) Provide IP addresses
C) Provide end-to-end communication.
D) Format data
  • 42. Which device uses a routing table to make decisions?
A) Router
B) Hub
C) Switch
D) Firewall
  • 43. Practical Application What kind of device uses both MAC and IP addresses?
A) Repeater
B) Hub
C) Computer/Host
D) Switch
  • 44. What protocol helps find the next-hop router?
A) Routing Protocols like OSPF
B) TCP
C) HTTP
D) FTP
  • 45. In subnetting, what happens when more bits are borrowed?
A) IP range increases.
B) More subnets. fewer hosts per subnet.
C) Fewer subnets.
D) Data is lost.
  • 46. Which class is for multicast?
A) Class C
B) Class B
C) Class A
D) Class D
  • 47. How many usable hosts are in a /30 network?
A) 3
B) 5
C) 4
D) 2
  • 48. Which tool is best for simulating networks in a classroom?
A) Netcat
B) PuTTY
C) Wireshark
D) Packet Tracer
Created with That Quiz — the site for test creation and grading in math and other subjects.