Online Networking Test - Networking Test 1

Instruction:

  • This is a FREE online test. Beware of scammers who ask for money to attend this test.
  • Total number of questions: 20.
  • Time allotted: 30 minutes.
  • Each question carries 1 mark; there are no negative marks.
  • DO NOT refresh the page.
  • All the best!

Marks : 2/20


Total number of questions
20
Number of answered questions
0
Number of unanswered questions
20
Test Review : View answers and explanation for this test.

1.
Which command is used to upgrade an IOS on a Cisco router?
copy tftp run
copy tftp start
config net
copy tftp flash
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The copy tftp flash command places a new file in flash memory, which is the default location for the Cisco IOS in Cisco routers.

2.
A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
Send a different source port number.
Restart the virtual circuit.
Decrease the sequence number.
Decrease the window size.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.

3.
Which fields are contained within an IEEE Ethernet frame header?
  1. Source and destination MAC address
  2. Source and destination network address
  3. Source and destination MAC address and source and destination network address
  4. FCS field
1 and 4
2 only
2 and 3 only
3 only
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
An Ethernet frame has source and destination MAC addresses, an Ether-Type field to identify the Network layer protocol, the data, and the FCS field that holds the answer to the CRC.

4.
Which of the following describe router functions?
Packet switching
Packet filtering
Internetwork communication
Path selection
All of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Routers provide packet switching, packet filtering, internetwork communication, and path selection.

5.
Which of the following are types of flow control?
  1. Buffering
  2. Cut-through
  3. Windowing
  4. Congestion avoidance
1 and 2
1, 3 and 4
2 only
3 only
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The common types of flow control are buffering, windowing, and congestion avoidance.

6.
What type of RJ45 UTP cable is used between switches?
Straight-through
Crossover cable
Crossover with a CSU/DSU
Crossover with a router in between the two switches
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
To connect two switches together, you would use a RJ45 UTP crossover cable.

7.
Which of the following are layers in the TCP/IP model?
  1. Application
  2. Session
  3. Transport
  4. Internet
  5. Data Link
  6. Physical
1 and 2
1, 3 and 4
2, 3 and 5
3, 4 and 5
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
This seems like a hard question at first because it doesn't make sense. The listed answers are from the OSI model and the question asked about the TCP/IP protocol stack (DoD model). However, let's just look for what is wrong. First, the Session layer is not in the TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (Application/Process in the DoD).

8.
Which of the following protocols uses both TCP and UDP?
FTP
SMTP
Telnet
DNS
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address.

9.
The network address of 172.16.0.0/19 provides how many subnets and hosts?
7 subnets, 30 hosts each
8 subnets, 8,190 hosts each
8 subnets, 2,046 hosts each
7 subnets, 2,046 hosts each
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.

10.
Which two statements describe the IP address 10.16.3.65/23?
  1. The subnet address is 10.16.3.0 255.255.254.0.
  2. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
  3. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
  4. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
1 and 3
2 and 4
1, 2 and 4
2, 3 and 4
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.

11.
If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to?
172.16.45.0
172.16.45.4
172.16.45.8
172.16.45.12
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet.

12.
On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?
/27
/28
/29
/30
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet.

13.
Which three commands can be used to check LAN connectivity problems on a router?
  1. show interfaces
  2. show ip route
  3. tracert
  4. ping
  5. dns lookups
1 ,2 and 4
2 and 5
3 and 5
None of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The tracert command is a Windows command and will not work on a router! A router uses the traceroute command.

14.
Which statement describes a spanning-tree network that has converged?
All switch and bridge ports are in the forwarding state.
All switch and bridge ports are assigned as either root or designated ports.
All switch and bridge ports are in either the forwarding or blocking state.
All switch and bridge ports are either blocking or looping.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Convergence occurs when all ports on bridges and switches have transitioned to either the forwarding or blocking states. No data is forwarded until convergence is complete. Before data can be forwarded again, all devices must be updated.

15.
A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the router and the switch?
10Mbps Ethernet
56Kbps Serial
100Mbps Ethernet
1Gbps Ethernet
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Although you can use either 100Mbps or 1Gbps Ethernet, the 100Mbps is necessary at a minimum and is the best answer to this question. You need to trunk the link from the switch to the router to make this connection work with inter-VLAN communication.

16.
You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?
access-list 10 deny 172.16.192.0 0.0.31.255
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.172.0 0.0.31.255
access-list 10 deny 172.16.188.0 0.0.15.255
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
First, you must know that a /19 is 255.255.224.0, which is a block size of 32 in the third octet. Counting by 32, this makes our subnet 192 in the third octet, and the wildcard for the third octet would be 31 since the wildcard is always one less than the block size.

17.
Which of the following are advantages of using NAT?
  1. Translation introduces switching path delays.
  2. Conserves legally registered addresses.
  3. Causes loss of end-to-end IP traceability.
  4. Increases flexibility when connecting to the Internet.
  5. Certain applications will not function with NAT enabled.
  6. Reduces address overlap occurrence.
1, 3 and 4
3, 5 and 6
5 and 6
2, 4 and 6
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
NAT is not perfect, but there are some advantages. It conserves global addresses, which allow us to add millions of hosts to the Internet without "real" IP addresses. This provides flexibility in our corporate networks. NAT can also allow you to use the same subnet more than once in the same network without overlapping networks.

18.
Which command will clear all the translations active on your router?
show ip nat translations
show ip nat statistics
debug ip nat
clear ip nat translations *
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The command clear ip nat translations * will clear all the active NAT entries in your translation table.

19.
Port Address Translation is also termed what?
NAT Fast
NAT Static
NAT Overload
Overloading Static
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Another term for port address translation is NAT Overload because that is the command used to enable port address translation.

20.
What is the frequency range of the IEEE 802.11b standard?
2.4Gbps
5Gbps
2.4GHz
5GHz
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The IEEE 802.11b and IEEE 802.11g standards both run in the 2.4GHz RF range.

*** END OF THE TEST ***
Time Left: 00:29:56
Post your test result / feedback here: