1Which layer of the OSI model is primarily responsible for process-to-process delivery of the entire message?
A.Network Layer
B.Transport Layer
C.Data Link Layer
D.Session Layer
Correct Answer: Transport Layer
Explanation:While the Network layer oversees host-to-host delivery, the Transport Layer ensures process-to-process delivery using port numbers.
Incorrect! Try again.
2The Transport Layer creates a connection between the source and destination ports. This type of addressing is known as:
A.Physical addressing
B.Logical addressing
C.Service-point (Port) addressing
D.Domain addressing
Correct Answer: Service-point (Port) addressing
Explanation:Port addressing (or Service-point addressing) identifies specific processes running on the host, which is the function of the Transport Layer.
Incorrect! Try again.
3Which of the following services is NOT typically provided by the Transport Layer?
A.Flow Control
B.Error Control
C.Routing
D.Segmentation and Reassembly
Correct Answer: Routing
Explanation:Routing is a function of the Network Layer (determining the path for packets). The Transport Layer handles flow control, error control, and segmentation.
Incorrect! Try again.
4In the context of the Transport Layer, what is multiplexing?
A.Sending data from multiple processes to the network layer via a single transport protocol
B.Splitting one signal into multiple frequencies
C.Distributing incoming packets to different processes
D.Connecting multiple routers together
Correct Answer: Sending data from multiple processes to the network layer via a single transport protocol
Explanation:Multiplexing at the Transport Layer involves gathering data from several application processes and sending them down to the Network Layer.
Incorrect! Try again.
5What is the size of the Sequence Number field in the TCP header?
A.16 bits
B.32 bits
C.64 bits
D.8 bits
Correct Answer: 32 bits
Explanation:The Sequence Number field in TCP is 32 bits long, allowing for distinct sequence numbers.
Incorrect! Try again.
6The minimum and maximum lengths of a TCP header are, respectively:
A.20 bytes and 40 bytes
B.20 bytes and 60 bytes
C.8 bytes and 20 bytes
D.20 bytes and 65535 bytes
Correct Answer: 20 bytes and 60 bytes
Explanation:The mandatory TCP header is 20 bytes. With the maximum size of the Options field (40 bytes), the total header size can reach 60 bytes.
Incorrect! Try again.
7In the TCP header, the Window Size field is used for:
A.Congestion Control
B.Flow Control
C.Error Detection
D.Connection Establishment
Correct Answer: Flow Control
Explanation:The Window Size field (16 bits) advertises the amount of data the receiver is willing to accept, which is the core mechanism of Flow Control.
Incorrect! Try again.
8Which flag in the TCP header is set to 1 to initiate a connection?
A.FIN
B.RST
C.SYN
D.URG
Correct Answer: SYN
Explanation:The SYN (Synchronize) flag is used during the three-way handshake to initiate a connection and synchronize sequence numbers.
Incorrect! Try again.
9If a TCP sender sends a segment with Sequence Number and payload length , what will be the Acknowledgement Number in the receiver's response (assuming successful receipt)?
A.
B.
C.
D.
Correct Answer:
Explanation:The Acknowledgement Number indicates the next byte expected. If bytes starting at with length are received, the next expected byte is .
Incorrect! Try again.
10Which of the following correctly describes the TCP Three-Way Handshake?
A.SYN SYN-ACK ACK
B.SYN ACK FIN
C.REQ RES ACK
D.SYN ACK SYN-ACK
Correct Answer: SYN SYN-ACK ACK
Explanation:The client sends a SYN, the server responds with a SYN-ACK, and the client confirms with an ACK.
Incorrect! Try again.
11The HLEN (Header Length) field in the TCP header is 4 bits. What is the multiplier used to calculate the total header size in bytes?
A.1 byte
B.4 bytes
C.8 bytes
D.16 bytes
Correct Answer: 4 bytes
Explanation:The value in the HLEN field represents the number of 4-byte words. Therefore, the value is multiplied by 4 to get the total bytes.
Incorrect! Try again.
12What is the purpose of the Urgent Pointer field in the TCP header?
A.It indicates the sequence number of the last byte of urgent data.
B.It points to the beginning of the next segment.
C.It resets the connection immediately.
D.It requests an immediate acknowledgement.
Correct Answer: It indicates the sequence number of the last byte of urgent data.
Explanation:The Urgent Pointer is valid only if the URG flag is set. It defines a value that must be added to the sequence number to find the end of the urgent data.
Incorrect! Try again.
13In TCP, the PSH (Push) flag informs the receiver to:
A.Push the data to the application layer immediately without buffering.
B.Push the connection termination request.
C.Prioritize this packet over others in the network.
D.Retransmit the previous segment.
Correct Answer: Push the data to the application layer immediately without buffering.
Explanation:The PSH flag tells the receiver to pass the data to the application as soon as possible, rather than waiting for the buffer to fill.
Incorrect! Try again.
14Which TCP field includes information from the IP header (source IP, dest IP, protocol, length) to ensure the segment reached the correct destination?
A.Padding
B.Options
C.Pseudo-header (used in Checksum calculation)
D.Window Size
Correct Answer: Pseudo-header (used in Checksum calculation)
Explanation:TCP calculates the checksum over the header, data, and a pseudo-header derived from the IP header to verify the segment is delivered to the correct IP/Protocol.
Incorrect! Try again.
15The standard size of a UDP header is fixed at:
A.20 bytes
B.8 bytes
C.16 bytes
D.32 bytes
Correct Answer: 8 bytes
Explanation:The UDP header is very simple and has a fixed size of 8 bytes.
Incorrect! Try again.
16Which of the following fields is NOT present in a UDP header?
A.Source Port
B.Destination Port
C.Sequence Number
D.Checksum
Correct Answer: Sequence Number
Explanation:UDP is connectionless and unreliable; it does not use Sequence Numbers or Acknowledgements.
Incorrect! Try again.
17Why is UDP often referred to as a connectionless protocol?
A.It does not use IP addresses.
B.It requires a 2-way handshake instead of 3-way.
C.It does not establish a virtual circuit or handshake before transmitting data.
D.It only works on wireless networks.
Correct Answer: It does not establish a virtual circuit or handshake before transmitting data.
Explanation:UDP sends independent datagrams without establishing a connection state or performing a handshake beforehand.
Incorrect! Try again.
18In the UDP header, the Length field includes:
A.Only the size of the data payload.
B.Only the size of the header.
C.The size of the header plus the data.
D.The size of the pseudo-header.
Correct Answer: The size of the header plus the data.
Explanation:The UDP Length field (16 bits) represents the total length of the user datagram, which includes the header and the data.
Incorrect! Try again.
19Which application would typically prefer UDP over TCP?
A.File Transfer (FTP)
B.Email (SMTP)
C.Real-time Video Streaming
D.Web Browsing (HTTP)
Correct Answer: Real-time Video Streaming
Explanation:Real-time applications prioritize speed over absolute reliability. Dropped frames (UDP) are preferable to the latency caused by retransmissions (TCP).
Incorrect! Try again.
20The calculation of the Checksum in UDP is:
A.Mandatory in IPv4, Optional in IPv6
B.Optional in IPv4, Mandatory in IPv6
C.Always Mandatory
D.Always Optional
Correct Answer: Optional in IPv4, Mandatory in IPv6
Explanation:UDP checksums are optional in IPv4 (though recommended) but were made mandatory in IPv6.
Incorrect! Try again.
21The Domain Name System (DNS) primarily uses which Transport Layer protocol for standard queries?
A.TCP
B.UDP
C.SCTP
D.ICMP
Correct Answer: UDP
Explanation:Standard DNS queries (small size) typically use UDP on port 53 for speed. TCP is used for Zone Transfers or large responses.
Incorrect! Try again.
22Which standard port number is assigned to DNS?
A.21
B.25
C.53
D.80
Correct Answer: 53
Explanation:DNS uses port 53.
Incorrect! Try again.
23In DNS, a Recursive Query puts the burden of resolution on the:
A.Client (Resolver)
B.Contacted Name Server
C.Root Server only
D.ISP
Correct Answer: Contacted Name Server
Explanation:In a recursive query, the contacted server must return the final answer (or an error), meaning it performs the subsequent lookups on behalf of the client.
Incorrect! Try again.
24Which DNS record type maps a hostname to an IPv4 address?
A.MX
B.CNAME
C.AAAA
D.A
Correct Answer: A
Explanation:The A record maps a host name to an IPv4 address. (AAAA is for IPv6, MX for mail, CNAME for aliases).
Incorrect! Try again.
25What is the structure of the DNS namespace?
A.Linear
B.Circular
C.Inverted Tree (Hierarchical)
D.Mesh
Correct Answer: Inverted Tree (Hierarchical)
Explanation:DNS uses a hierarchical tree structure, starting with the Root (), followed by TLDs, Domain names, and Subdomains.
Incorrect! Try again.
26Which protocol is used to push email from a client to a mail server?
A.POP3
B.IMAP
C.SMTP
D.HTTP
Correct Answer: SMTP
Explanation:SMTP (Simple Mail Transfer Protocol) is a push protocol used to send mail from client to server or between servers.
Incorrect! Try again.
27Post Office Protocol version 3 (POP3) is primarily used for:
A.Sending emails between servers
B.Resolving domain names
C.Retrieving emails from a server to a client
D.Encrypting email content
Correct Answer: Retrieving emails from a server to a client
Explanation:POP3 is a pull protocol used by a user agent to retrieve and download emails from a mail server.
Incorrect! Try again.
28What is the main advantage of IMAP over POP3?
A.IMAP is faster.
B.IMAP allows managing emails directly on the server (folders, flags).
C.IMAP does not require authentication.
D.IMAP uses UDP for reliability.
Correct Answer: IMAP allows managing emails directly on the server (folders, flags).
Explanation:IMAP keeps email on the server, allowing synchronization across multiple devices and folder management, whereas standard POP3 downloads and deletes.
Incorrect! Try again.
29SMTP uses which port number by default?
A.21
B.23
C.25
D.110
Correct Answer: 25
Explanation:The standard port for SMTP is 25.
Incorrect! Try again.
30Which standard extends email to support non-ASCII text, audio, and video attachments?
A.NVT
B.MIME
C.FTP
D.TELNET
Correct Answer: MIME
Explanation:MIME (Multipurpose Internet Mail Extensions) extends the format of email to support text in character sets other than ASCII, as well as attachments.
Incorrect! Try again.
31FTP (File Transfer Protocol) establishes two connections between client and server. They are:
A.Upload connection and Download connection
B.Control connection and Data connection
C.Primary connection and Backup connection
D.TCP connection and UDP connection
Correct Answer: Control connection and Data connection
Explanation:FTP uses separate connections: a Control connection (Port 21) for commands and a Data connection (Port 20) for transferring files.
Incorrect! Try again.
32Which port is used for the FTP Control Connection?
A.20
B.21
C.22
D.80
Correct Answer: 21
Explanation:Port 21 is used to establish the control connection where commands are sent.
Incorrect! Try again.
33In FTP, the control connection is considered "out-of-band". What does this mean?
A.It uses a different frequency.
B.It uses a separate channel/socket from the data transfer.
C.It operates outside the internet.
D.It has higher bandwidth.
Correct Answer: It uses a separate channel/socket from the data transfer.
Explanation:Out-of-band means control information is sent over a separate logical link (Port 21) than the actual data (Port 20).
Incorrect! Try again.
34What is SD-WAN (Software Defined Wide Area Network)?
A.A hardware-only solution for connecting LANs.
B.A protocol strictly for fiber optics.
C.A virtual WAN architecture that decouples network software services from underlying hardware.
D.A new version of the internet protocol.
Correct Answer: A virtual WAN architecture that decouples network software services from underlying hardware.
Explanation:SD-WAN applies SDN concepts to WANs, abstracting the control plane from the data plane to manage routing via software.
Incorrect! Try again.
35A key benefit of SD-WAN regarding transport independence is:
A.It only works with MPLS.
B.It allows the aggregation of multiple connection types (MPLS, 4G, Broadband, LTE).
C.It removes the need for IP addresses.
D.It requires satellite connections.
Correct Answer: It allows the aggregation of multiple connection types (MPLS, 4G, Broadband, LTE).
Explanation:SD-WAN can bond various transport links (MPLS, Internet, LTE) into a single virtual overlay, optimizing performance and cost.
Incorrect! Try again.
36In SD-WAN, what is ZTP?
A.Zero Transmission Protocol
B.Zone Transfer Protocol
C.Zero Touch Provisioning
D.Zigzag Transmission Path
Correct Answer: Zero Touch Provisioning
Explanation:Zero Touch Provisioning allows devices to be configured automatically upon connection to the network without manual local setup.
Incorrect! Try again.
37Unlike traditional router-based WANs, SD-WAN manages the network via:
A.Manual CLI configuration on every device
B.A Centralized Controller
C.Peer-to-peer negotiation
D.The Physical Layer
Correct Answer: A Centralized Controller
Explanation:SD-WAN uses a centralized controller to push policies and configurations to all edge devices.
Incorrect! Try again.
38What is the primary function of a CDN (Content Delivery Network)?
A.To generate dynamic content for websites.
B.To distribute content to edge servers closer to users to reduce latency.
C.To replace the DNS system.
D.To compress files for storage.
Correct Answer: To distribute content to edge servers closer to users to reduce latency.
Explanation:CDNs cache content in geographically distributed servers (Edge Servers) to deliver it to users from the nearest location, reducing latency.
Incorrect! Try again.
39In a CDN architecture, the Point of Presence (PoP) refers to:
A.The central database.
B.The user's computer.
C.A physical location where CDN servers reside.
D.The protocol used for caching.
Correct Answer: A physical location where CDN servers reside.
Explanation:A PoP is a strategic physical location (often a data center) containing one or more edge servers that cache content.
Incorrect! Try again.
40Which DNS mechanism is commonly used by CDNs to direct a user to the nearest edge server?
A.Static Hosts File
B.Geo-DNS / Anycast DNS
C.Reverse DNS Lookup
D.DHCP
Correct Answer: Geo-DNS / Anycast DNS
Explanation:CDNs use intelligent DNS resolution (Geo-DNS) to resolve the domain name to the IP address of the edge server geographically closest to the user.
Incorrect! Try again.
41Which of the following is a security benefit often provided by CDNs?
A.End-to-end encryption of the physical cable
B.DDoS (Distributed Denial of Service) mitigation
C.Automatic password generation
D.Virus scanning of local hard drives
Correct Answer: DDoS (Distributed Denial of Service) mitigation
Explanation:Because CDNs have massive bandwidth and distributed infrastructure, they can absorb large traffic spikes associated with DDoS attacks.
Incorrect! Try again.
42In the context of CDN, what is the Origin Server?
A.The first server ever built.
B.The server where the original, definitive version of the content resides.
C.The user's laptop requesting the file.
D.The nearest edge server.
Correct Answer: The server where the original, definitive version of the content resides.
Explanation:The Origin Server holds the master copy of the content. Edge servers pull data from the Origin Server to cache it.
Incorrect! Try again.
43What happens in a CDN when a requested file is not in the cache (Cache Miss)?
A.The user gets a 404 error.
B.The edge server requests the file from the Origin Server, delivers it, and caches it.
C.The connection is dropped.
D.The user is redirected to a different website.
Correct Answer: The edge server requests the file from the Origin Server, delivers it, and caches it.
Explanation:On a cache miss, the CDN fetches the content from the origin, serves it to the user, and stores it for future requests.
Incorrect! Try again.
44SD-WAN capability to identify traffic based on Layer 7 (Application) information is called:
A.Packet Switching
B.Application Awareness
C.Port Forwarding
D.Circuit Switching
Correct Answer: Application Awareness
Explanation:SD-WAN can inspect packets to identify specific applications (e.g., Zoom, Netflix) and apply specific policies (QoS) to them, known as Application Awareness.
Incorrect! Try again.
45Which TCP mechanism prevents a sender from overwhelming the receiver?
A.Congestion Control
B.Flow Control
C.Fast Retransmit
D.Slow Start
Correct Answer: Flow Control
Explanation:Flow control (using the Window mechanism) matches the sending rate to the receiving process's reading rate to prevent buffer overflow at the receiver.
Incorrect! Try again.
46Which TCP mechanism prevents a sender from overwhelming the network?
A.Flow Control
B.Congestion Control
C.Error Control
D.Keep-alive
Correct Answer: Congestion Control
Explanation:Congestion control (using mechanisms like Slow Start and Congestion Avoidance) handles traffic to prevent network saturation.
Incorrect! Try again.
47In TCP connection termination, how many segments are typically exchanged?
A.2
B.3
C.4
D.6
Correct Answer: 4
Explanation:Termination is a 4-step process: FIN (A to B), ACK (B to A), FIN (B to A), ACK (A to B).
Incorrect! Try again.
48What is the primary role of the User Agent in an email system?
A.To store emails permanently.
B.To route emails through the internet.
C.To allow the user to compose, read, and reply to messages.
D.To maintain the DNS records for the mail server.
Correct Answer: To allow the user to compose, read, and reply to messages.
Explanation:The User Agent (e.g., Outlook, Thunderbird, Webmail interface) is the software the user interacts with.
Incorrect! Try again.
49In FTP, 'Anonymous FTP' allows a user to login with the username:
A.guest
B.anonymous
C.admin
D.root
Correct Answer: anonymous
Explanation:Public FTP servers often allow access using the username 'anonymous', typically requiring an email address or nothing as the password.
Incorrect! Try again.
50Which of the following is an example of a Recent Trend in networking that moves computation closer to the source of data generation?
A.Mainframe Computing
B.Edge Computing
C.Client-Server Architecture
D.Batch Processing
Correct Answer: Edge Computing
Explanation:Edge Computing (often used with CDNs and IoT) processes data near the edge of the network rather than in a centralized cloud, reducing latency.
Incorrect! Try again.
Give Feedback
Help us improve by sharing your thoughts or reporting issues.