WXFG49L
  • 1. What is the main purpose of data transmission?
A) Encrypting messages.
B) Increasing bandwidth.
C) Preventing data loss
D) Sending and receiving data between devices.
  • 2. Why are communication protocols important?
A) They define rules for data exchange and ensure integrity
B) They clean corrupted data.
C) They compress files.
D) They allocate IP addresses.
  • 3. Which OSI layer ensures reliable delivery?
A) network
B) Data link
C) Transport
D) Physical
  • 4. What layer of the OSI model handles logical addressing and routing?
A) Network
B) Data link
C) Network
D) Physical
  • 5. Which protocol operates at the Application layer?
A) Ethernet
B) IP
C) TCP
D) HTTP
  • 6. How many layers does the OSI model have?
A) 7
B) 5
C) 6
D) 4
  • 7. The TCP/IP model has how many layers?
A) 6
B) 4
C) 7
D) 5
  • 8. The Network Access layer in TCP/IP combines which OSI layers?
A) Network and Transport.
B) Application and Transpor.
C) Application and Presentation
D) Data Link and Physical
  • 9. Encapsulation & De-Encapsulation What is data encapsulation?
A) Deleting packets.
B) Adding headers/trailers to data
C) Data encryption
D) Deleting packets.
  • 10. Which layer converts data into signals?
A) Session
B) Physical
C) Network
D) Data Link
  • 11. In the encapsulation process, which layer adds source and destination IP addresses?
A) Session
B) Data link
C) Network
D) Physical
  • 12. What does the Data Link layer add during encapsulation?
A) IP addresses
B) Protocol identifiers.
C) MAC hearders and trailers
D) Port numbers.
  • 13. What is the main purpose of ARP?
A) Assign IP addresses
B) Resolve IP to MAC adddresses.
C) Translate domain names.
D) Check connectivity.
  • 14. What does a computer send when it doesn't know a MAC address?
A) Ping Request
B) ICMP Echo
C) ARP Reques.
D) DNS Query
  • 15. ARP Spoofing is a.
A) DNS attack.
B) Hardware failure.
C) Man-in-the-middle attack.
D) Software update.
  • 16. ICMP Which command uses ICMP Echo Requests?
A) ping
B) netstat
C) arp
D) ipconfig
  • 17. Which ICMP message is used in Traceroute?
A) Assigning IP addresses
B) Configuring firewalls
C) Determining paths for data
D) Time Exceeded
  • 18. Which type of routing uses protocols like OSPF?
A) Dynamic Routing
B) Static Routing
C) ) Manual Routing
D) Physical Routing
  • 19. Which routing protocol is best for small networks?
A) RIP
B) DHCP
C) BGP
D) OSPF
  • 20. What does a routing table contain?
A) Encrypted passwords
B) MAC addresses
C) DNS records
D) Destination networks and next hops
  • 21. What is the purpose of a default gateway?
A) It converts MAC to IP
B) Forwards traffic to external networks
C) Encrypts data
D) Assigns static routes
  • 22. IP Addressing What type of address is 192.168.1.1?
A) Private IPv4 address.
B) ) Reserved multicast.
C) Public IPv6 address
D) Loopback address
  • 23. How many bits are in an IPv4 address?
A) 32
B) 64
C) 8
D) 128
  • 24. What is the loopback IP address?
A) 127.0.0.1
B) 192.168.0.1
C) 0.0.0.0
D) 10.0.0.1
  • 25. Which IP address class has a default subnet mask of 255.255.255.0?
A) Class D
B) Class B
C) Class C
D) Class A
  • 26. Subnetting What is the CIDR notation for 255.255.255.0?
A) /28
B) /27
C) /24
D) /26
  • 27. How many usable IPs are in a /26 subnet?
A) 32
B) 62
C) 8
D) 16
  • 28. What is the broadcast address of 192.168.1.0/26?
A) B) 192.168.1.64
B) B) 192.168.1.62
C) B) 192.168.1.61
D) 192.168.1.63
  • 29. VLSM (Variable Length Subnet Masking) VLSM allows.
A) Different subnet sizes in the same network
B) Port translation
C) ) Same subnet size everywhere
D) Encryption by subnet
  • 30. Which subnet mask is appropriate for 20 hosts?
A) /30
B) /24
C) /28
D) /27
  • 31. How many bits are in an IPv6 address?
A) 128
B) 32
C) 48
D) 64
  • 32. What format is used in IPv6?
A) Hexadecimal
B) Octal
C) Decimal
D) Binary
  • 33. Which of the following is a valid IPv6 address?
A) 192.168.1.1
B) 2001:db8::1
C) 127.0.0.1
D) 10.0.0.1
  • 34. Does IPv6 use subnet masks?
A) Yes
B) Sometimes
C) Only for private ips
D) No, uses prefix notation
  • 35. ools & Troubleshooting Which command shows current IP configuration?
A) tracert
B) ipconfig / ifconfig
C) Ping
D) netstat
  • 36. What does arp -a do?
A) Trace MAC addresses
B) Display ARP cache
C) Show routing table
D) Display ARP table
  • 37. traceroute is used to:
A) Resolve DNS
B) Encrypt packets
C) Trace the path to a destination.
D) Check MAC addresses
  • 38. What layer is responsible for user interaction in OSI?
A) Application
B) Session
C) Network
D) Transport
  • 39. Which protocol is used for error messages in IP networks?
A) TCP
B) FTP
C) ICMP
D) SMTP
  • 40. Ethernet works on which OSI layer?
A) Transport
B) Data link
C) Physical only
D) Network
  • 41. What is the role of the Transport layer?
A) Format data
B) Provide end-to-end communication.
C) Encrypt data
D) Provide IP addresses
  • 42. Which device uses a routing table to make decisions?
A) Router
B) Hub
C) Firewall
D) Switch
  • 43. Practical Application What kind of device uses both MAC and IP addresses?
A) Repeater
B) Computer/Host
C) Hub
D) Switch
  • 44. What protocol helps find the next-hop router?
A) HTTP
B) TCP
C) FTP
D) Routing Protocols like OSPF
  • 45. In subnetting, what happens when more bits are borrowed?
A) More subnets. fewer hosts per subnet.
B) IP range increases.
C) Data is lost.
D) Fewer subnets.
  • 46. Which class is for multicast?
A) Class A
B) Class C
C) Class D
D) Class B
  • 47. How many usable hosts are in a /30 network?
A) 4
B) 2
C) 3
D) 5
  • 48. Which tool is best for simulating networks in a classroom?
A) Packet Tracer
B) PuTTY
C) Wireshark
D) Netcat
Created with That Quiz — the site for test creation and grading in math and other subjects.