WXFG49L
  • 1. What is the main purpose of data transmission?
A) Sending and receiving data between devices.
B) Encrypting messages.
C) Preventing data loss
D) Increasing bandwidth.
  • 2. Why are communication protocols important?
A) They define rules for data exchange and ensure integrity
B) They clean corrupted data.
C) They compress files.
D) They allocate IP addresses.
  • 3. Which OSI layer ensures reliable delivery?
A) network
B) Transport
C) Physical
D) Data link
  • 4. What layer of the OSI model handles logical addressing and routing?
A) Data link
B) Network
C) Network
D) Physical
  • 5. Which protocol operates at the Application layer?
A) Ethernet
B) IP
C) HTTP
D) TCP
  • 6. How many layers does the OSI model have?
A) 7
B) 6
C) 5
D) 4
  • 7. The TCP/IP model has how many layers?
A) 4
B) 5
C) 7
D) 6
  • 8. The Network Access layer in TCP/IP combines which OSI layers?
A) Application and Transpor.
B) Data Link and Physical
C) Application and Presentation
D) Network and Transport.
  • 9. Encapsulation & De-Encapsulation What is data encapsulation?
A) Deleting packets.
B) Data encryption
C) Deleting packets.
D) Adding headers/trailers to data
  • 10. Which layer converts data into signals?
A) Session
B) Physical
C) Network
D) Data Link
  • 11. In the encapsulation process, which layer adds source and destination IP addresses?
A) Physical
B) Data link
C) Session
D) Network
  • 12. What does the Data Link layer add during encapsulation?
A) MAC hearders and trailers
B) Protocol identifiers.
C) Port numbers.
D) IP addresses
  • 13. What is the main purpose of ARP?
A) Assign IP addresses
B) Check connectivity.
C) Translate domain names.
D) Resolve IP to MAC adddresses.
  • 14. What does a computer send when it doesn't know a MAC address?
A) ICMP Echo
B) Ping Request
C) DNS Query
D) ARP Reques.
  • 15. ARP Spoofing is a.
A) Hardware failure.
B) DNS attack.
C) Software update.
D) Man-in-the-middle attack.
  • 16. ICMP Which command uses ICMP Echo Requests?
A) arp
B) ipconfig
C) ping
D) netstat
  • 17. Which ICMP message is used in Traceroute?
A) Assigning IP addresses
B) Configuring firewalls
C) Determining paths for data
D) Time Exceeded
  • 18. Which type of routing uses protocols like OSPF?
A) Dynamic Routing
B) Physical Routing
C) Static Routing
D) ) Manual Routing
  • 19. Which routing protocol is best for small networks?
A) BGP
B) OSPF
C) DHCP
D) RIP
  • 20. What does a routing table contain?
A) MAC addresses
B) Encrypted passwords
C) DNS records
D) Destination networks and next hops
  • 21. What is the purpose of a default gateway?
A) Forwards traffic to external networks
B) It converts MAC to IP
C) Assigns static routes
D) Encrypts data
  • 22. IP Addressing What type of address is 192.168.1.1?
A) Loopback address
B) Private IPv4 address.
C) Public IPv6 address
D) ) Reserved multicast.
  • 23. How many bits are in an IPv4 address?
A) 8
B) 64
C) 128
D) 32
  • 24. What is the loopback IP address?
A) 10.0.0.1
B) 0.0.0.0
C) 127.0.0.1
D) 192.168.0.1
  • 25. Which IP address class has a default subnet mask of 255.255.255.0?
A) Class D
B) Class B
C) Class A
D) Class C
  • 26. Subnetting What is the CIDR notation for 255.255.255.0?
A) /28
B) /27
C) /24
D) /26
  • 27. How many usable IPs are in a /26 subnet?
A) 8
B) 62
C) 32
D) 16
  • 28. What is the broadcast address of 192.168.1.0/26?
A) B) 192.168.1.64
B) 192.168.1.63
C) B) 192.168.1.61
D) B) 192.168.1.62
  • 29. VLSM (Variable Length Subnet Masking) VLSM allows.
A) Different subnet sizes in the same network
B) ) Same subnet size everywhere
C) Port translation
D) Encryption by subnet
  • 30. Which subnet mask is appropriate for 20 hosts?
A) /28
B) /30
C) /27
D) /24
  • 31. How many bits are in an IPv6 address?
A) 64
B) 48
C) 128
D) 32
  • 32. What format is used in IPv6?
A) Hexadecimal
B) Octal
C) Binary
D) Decimal
  • 33. Which of the following is a valid IPv6 address?
A) 127.0.0.1
B) 2001:db8::1
C) 10.0.0.1
D) 192.168.1.1
  • 34. Does IPv6 use subnet masks?
A) Only for private ips
B) Sometimes
C) Yes
D) No, uses prefix notation
  • 35. ools & Troubleshooting Which command shows current IP configuration?
A) tracert
B) ipconfig / ifconfig
C) netstat
D) Ping
  • 36. What does arp -a do?
A) Display ARP table
B) Trace MAC addresses
C) Show routing table
D) Display ARP cache
  • 37. traceroute is used to:
A) Check MAC addresses
B) Encrypt packets
C) Resolve DNS
D) Trace the path to a destination.
  • 38. What layer is responsible for user interaction in OSI?
A) Network
B) Session
C) Transport
D) Application
  • 39. Which protocol is used for error messages in IP networks?
A) ICMP
B) SMTP
C) TCP
D) FTP
  • 40. Ethernet works on which OSI layer?
A) Physical only
B) Network
C) Transport
D) Data link
  • 41. What is the role of the Transport layer?
A) Encrypt data
B) Provide IP addresses
C) Format data
D) Provide end-to-end communication.
  • 42. Which device uses a routing table to make decisions?
A) Firewall
B) Switch
C) Router
D) Hub
  • 43. Practical Application What kind of device uses both MAC and IP addresses?
A) Computer/Host
B) Hub
C) Switch
D) Repeater
  • 44. What protocol helps find the next-hop router?
A) HTTP
B) TCP
C) FTP
D) Routing Protocols like OSPF
  • 45. In subnetting, what happens when more bits are borrowed?
A) More subnets. fewer hosts per subnet.
B) Data is lost.
C) Fewer subnets.
D) IP range increases.
  • 46. Which class is for multicast?
A) Class B
B) Class A
C) Class D
D) Class C
  • 47. How many usable hosts are in a /30 network?
A) 2
B) 5
C) 3
D) 4
  • 48. Which tool is best for simulating networks in a classroom?
A) Netcat
B) Wireshark
C) Packet Tracer
D) PuTTY
Created with That Quiz — the site for test creation and grading in math and other subjects.