WXFG49L
  • 1. What is the main purpose of data transmission?
A) Encrypting messages.
B) Increasing bandwidth.
C) Sending and receiving data between devices.
D) Preventing data loss
  • 2. Why are communication protocols important?
A) They clean corrupted data.
B) They define rules for data exchange and ensure integrity
C) They compress files.
D) They allocate IP addresses.
  • 3. Which OSI layer ensures reliable delivery?
A) Data link
B) Transport
C) network
D) Physical
  • 4. What layer of the OSI model handles logical addressing and routing?
A) Network
B) Data link
C) Network
D) Physical
  • 5. Which protocol operates at the Application layer?
A) IP
B) Ethernet
C) HTTP
D) TCP
  • 6. How many layers does the OSI model have?
A) 4
B) 5
C) 7
D) 6
  • 7. The TCP/IP model has how many layers?
A) 6
B) 4
C) 7
D) 5
  • 8. The Network Access layer in TCP/IP combines which OSI layers?
A) Data Link and Physical
B) Application and Presentation
C) Application and Transpor.
D) Network and Transport.
  • 9. Encapsulation & De-Encapsulation What is data encapsulation?
A) Deleting packets.
B) Data encryption
C) Deleting packets.
D) Adding headers/trailers to data
  • 10. Which layer converts data into signals?
A) Data Link
B) Physical
C) Session
D) Network
  • 11. In the encapsulation process, which layer adds source and destination IP addresses?
A) Network
B) Session
C) Data link
D) Physical
  • 12. What does the Data Link layer add during encapsulation?
A) Protocol identifiers.
B) MAC hearders and trailers
C) Port numbers.
D) IP addresses
  • 13. What is the main purpose of ARP?
A) Translate domain names.
B) Resolve IP to MAC adddresses.
C) Check connectivity.
D) Assign IP addresses
  • 14. What does a computer send when it doesn't know a MAC address?
A) ARP Reques.
B) Ping Request
C) ICMP Echo
D) DNS Query
  • 15. ARP Spoofing is a.
A) Hardware failure.
B) DNS attack.
C) Software update.
D) Man-in-the-middle attack.
  • 16. ICMP Which command uses ICMP Echo Requests?
A) netstat
B) ping
C) ipconfig
D) arp
  • 17. Which ICMP message is used in Traceroute?
A) Configuring firewalls
B) Determining paths for data
C) Time Exceeded
D) Assigning IP addresses
  • 18. Which type of routing uses protocols like OSPF?
A) Physical Routing
B) Static Routing
C) Dynamic Routing
D) ) Manual Routing
  • 19. Which routing protocol is best for small networks?
A) RIP
B) OSPF
C) BGP
D) DHCP
  • 20. What does a routing table contain?
A) DNS records
B) Destination networks and next hops
C) Encrypted passwords
D) MAC addresses
  • 21. What is the purpose of a default gateway?
A) Assigns static routes
B) Encrypts data
C) It converts MAC to IP
D) Forwards traffic to external networks
  • 22. IP Addressing What type of address is 192.168.1.1?
A) Public IPv6 address
B) Loopback address
C) ) Reserved multicast.
D) Private IPv4 address.
  • 23. How many bits are in an IPv4 address?
A) 64
B) 32
C) 128
D) 8
  • 24. What is the loopback IP address?
A) 127.0.0.1
B) 192.168.0.1
C) 10.0.0.1
D) 0.0.0.0
  • 25. Which IP address class has a default subnet mask of 255.255.255.0?
A) Class A
B) Class C
C) Class D
D) Class B
  • 26. Subnetting What is the CIDR notation for 255.255.255.0?
A) /26
B) /24
C) /27
D) /28
  • 27. How many usable IPs are in a /26 subnet?
A) 62
B) 16
C) 8
D) 32
  • 28. What is the broadcast address of 192.168.1.0/26?
A) B) 192.168.1.62
B) B) 192.168.1.61
C) B) 192.168.1.64
D) 192.168.1.63
  • 29. VLSM (Variable Length Subnet Masking) VLSM allows.
A) Port translation
B) Different subnet sizes in the same network
C) ) Same subnet size everywhere
D) Encryption by subnet
  • 30. Which subnet mask is appropriate for 20 hosts?
A) /30
B) /24
C) /28
D) /27
  • 31. How many bits are in an IPv6 address?
A) 48
B) 64
C) 32
D) 128
  • 32. What format is used in IPv6?
A) Octal
B) Decimal
C) Hexadecimal
D) Binary
  • 33. Which of the following is a valid IPv6 address?
A) 192.168.1.1
B) 127.0.0.1
C) 2001:db8::1
D) 10.0.0.1
  • 34. Does IPv6 use subnet masks?
A) Yes
B) Only for private ips
C) No, uses prefix notation
D) Sometimes
  • 35. ools & Troubleshooting Which command shows current IP configuration?
A) Ping
B) tracert
C) ipconfig / ifconfig
D) netstat
  • 36. What does arp -a do?
A) Display ARP table
B) Trace MAC addresses
C) Show routing table
D) Display ARP cache
  • 37. traceroute is used to:
A) Encrypt packets
B) Resolve DNS
C) Trace the path to a destination.
D) Check MAC addresses
  • 38. What layer is responsible for user interaction in OSI?
A) Transport
B) Session
C) Application
D) Network
  • 39. Which protocol is used for error messages in IP networks?
A) ICMP
B) FTP
C) SMTP
D) TCP
  • 40. Ethernet works on which OSI layer?
A) Network
B) Data link
C) Transport
D) Physical only
  • 41. What is the role of the Transport layer?
A) Provide end-to-end communication.
B) Format data
C) Provide IP addresses
D) Encrypt data
  • 42. Which device uses a routing table to make decisions?
A) Firewall
B) Router
C) Switch
D) Hub
  • 43. Practical Application What kind of device uses both MAC and IP addresses?
A) Repeater
B) Computer/Host
C) Switch
D) Hub
  • 44. What protocol helps find the next-hop router?
A) FTP
B) TCP
C) HTTP
D) Routing Protocols like OSPF
  • 45. In subnetting, what happens when more bits are borrowed?
A) More subnets. fewer hosts per subnet.
B) IP range increases.
C) Data is lost.
D) Fewer subnets.
  • 46. Which class is for multicast?
A) Class B
B) Class D
C) Class C
D) Class A
  • 47. How many usable hosts are in a /30 network?
A) 5
B) 4
C) 2
D) 3
  • 48. Which tool is best for simulating networks in a classroom?
A) PuTTY
B) Wireshark
C) Netcat
D) Packet Tracer
Created with That Quiz — the site for test creation and grading in math and other subjects.