ThatQuiz Test Library Take this test now
WXFG49L
Contributed by: Monteclaro
  • 1. What is the main purpose of data transmission?
A) Encrypting messages.
B) Preventing data loss
C) Increasing bandwidth.
D) Sending and receiving data between devices.
  • 2. Why are communication protocols important?
A) They define rules for data exchange and ensure integrity
B) They compress files.
C) They clean corrupted data.
D) They allocate IP addresses.
  • 3. Which OSI layer ensures reliable delivery?
A) Data link
B) network
C) Physical
D) Transport
  • 4. What layer of the OSI model handles logical addressing and routing?
A) Network
B) Data link
C) Physical
D) Network
  • 5. Which protocol operates at the Application layer?
A) TCP
B) IP
C) HTTP
D) Ethernet
  • 6. How many layers does the OSI model have?
A) 5
B) 6
C) 7
D) 4
  • 7. The TCP/IP model has how many layers?
A) 7
B) 4
C) 6
D) 5
  • 8. The Network Access layer in TCP/IP combines which OSI layers?
A) Application and Transpor.
B) Data Link and Physical
C) Network and Transport.
D) Application and Presentation
  • 9. Encapsulation & De-Encapsulation What is data encapsulation?
A) Deleting packets.
B) Data encryption
C) Deleting packets.
D) Adding headers/trailers to data
  • 10. Which layer converts data into signals?
A) Network
B) Physical
C) Data Link
D) Session
  • 11. In the encapsulation process, which layer adds source and destination IP addresses?
A) Physical
B) Session
C) Network
D) Data link
  • 12. What does the Data Link layer add during encapsulation?
A) Port numbers.
B) MAC hearders and trailers
C) Protocol identifiers.
D) IP addresses
  • 13. What is the main purpose of ARP?
A) Translate domain names.
B) Check connectivity.
C) Resolve IP to MAC adddresses.
D) Assign IP addresses
  • 14. What does a computer send when it doesn't know a MAC address?
A) DNS Query
B) Ping Request
C) ARP Reques.
D) ICMP Echo
  • 15. ARP Spoofing is a.
A) Hardware failure.
B) DNS attack.
C) Man-in-the-middle attack.
D) Software update.
  • 16. ICMP Which command uses ICMP Echo Requests?
A) ping
B) ipconfig
C) netstat
D) arp
  • 17. Which ICMP message is used in Traceroute?
A) Assigning IP addresses
B) Determining paths for data
C) Configuring firewalls
D) Time Exceeded
  • 18. Which type of routing uses protocols like OSPF?
A) Physical Routing
B) ) Manual Routing
C) Dynamic Routing
D) Static Routing
  • 19. Which routing protocol is best for small networks?
A) DHCP
B) BGP
C) RIP
D) OSPF
  • 20. What does a routing table contain?
A) DNS records
B) MAC addresses
C) Encrypted passwords
D) Destination networks and next hops
  • 21. What is the purpose of a default gateway?
A) Assigns static routes
B) Forwards traffic to external networks
C) It converts MAC to IP
D) Encrypts data
  • 22. IP Addressing What type of address is 192.168.1.1?
A) Loopback address
B) ) Reserved multicast.
C) Public IPv6 address
D) Private IPv4 address.
  • 23. How many bits are in an IPv4 address?
A) 128
B) 64
C) 8
D) 32
  • 24. What is the loopback IP address?
A) 192.168.0.1
B) 127.0.0.1
C) 10.0.0.1
D) 0.0.0.0
  • 25. Which IP address class has a default subnet mask of 255.255.255.0?
A) Class B
B) Class D
C) Class A
D) Class C
  • 26. Subnetting What is the CIDR notation for 255.255.255.0?
A) /27
B) /26
C) /28
D) /24
  • 27. How many usable IPs are in a /26 subnet?
A) 8
B) 32
C) 16
D) 62
  • 28. What is the broadcast address of 192.168.1.0/26?
A) B) 192.168.1.62
B) B) 192.168.1.64
C) B) 192.168.1.61
D) 192.168.1.63
  • 29. VLSM (Variable Length Subnet Masking) VLSM allows.
A) ) Same subnet size everywhere
B) Different subnet sizes in the same network
C) Encryption by subnet
D) Port translation
  • 30. Which subnet mask is appropriate for 20 hosts?
A) /28
B) /27
C) /30
D) /24
  • 31. How many bits are in an IPv6 address?
A) 32
B) 48
C) 64
D) 128
  • 32. What format is used in IPv6?
A) Octal
B) Decimal
C) Binary
D) Hexadecimal
  • 33. Which of the following is a valid IPv6 address?
A) 2001:db8::1
B) 127.0.0.1
C) 192.168.1.1
D) 10.0.0.1
  • 34. Does IPv6 use subnet masks?
A) Only for private ips
B) No, uses prefix notation
C) Yes
D) Sometimes
  • 35. ools & Troubleshooting Which command shows current IP configuration?
A) Ping
B) ipconfig / ifconfig
C) netstat
D) tracert
  • 36. What does arp -a do?
A) Trace MAC addresses
B) Display ARP table
C) Show routing table
D) Display ARP cache
  • 37. traceroute is used to:
A) Resolve DNS
B) Trace the path to a destination.
C) Encrypt packets
D) Check MAC addresses
  • 38. What layer is responsible for user interaction in OSI?
A) Transport
B) Network
C) Application
D) Session
  • 39. Which protocol is used for error messages in IP networks?
A) SMTP
B) TCP
C) FTP
D) ICMP
  • 40. Ethernet works on which OSI layer?
A) Data link
B) Network
C) Transport
D) Physical only
  • 41. What is the role of the Transport layer?
A) Encrypt data
B) Provide IP addresses
C) Format data
D) Provide end-to-end communication.
  • 42. Which device uses a routing table to make decisions?
A) Switch
B) Router
C) Hub
D) Firewall
  • 43. Practical Application What kind of device uses both MAC and IP addresses?
A) Switch
B) Computer/Host
C) Repeater
D) Hub
  • 44. What protocol helps find the next-hop router?
A) Routing Protocols like OSPF
B) HTTP
C) TCP
D) FTP
  • 45. In subnetting, what happens when more bits are borrowed?
A) More subnets. fewer hosts per subnet.
B) Data is lost.
C) IP range increases.
D) Fewer subnets.
  • 46. Which class is for multicast?
A) Class A
B) Class B
C) Class C
D) Class D
  • 47. How many usable hosts are in a /30 network?
A) 5
B) 2
C) 4
D) 3
  • 48. Which tool is best for simulating networks in a classroom?
A) Wireshark
B) PuTTY
C) Netcat
D) Packet Tracer
Created with That Quiz — the site for test creation and grading in math and other subjects.