Unit 2 - Practice Quiz

CSE357 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following formulas represents the number of links required in a fully connected mesh topology with devices?

A.
B.
C.
D.

2 Which layer of the OSI model is responsible for logical addressing and routing?

A. Network Layer
B. Data Link Layer
C. Transport Layer
D. Session Layer

3 In the context of IPv4, what is the length of an IP address in bits?

A. 32 bits
B. 64 bits
C. 128 bits
D. 48 bits

4 Which transmission medium uses light pulses to transmit data and relies on the principle of total internal reflection?

A. Unshielded Twisted Pair (UTP)
B. Shielded Twisted Pair (STP)
C. Coaxial Cable
D. Fiber Optic Cable

5 Given a subnet mask of 255.255.255.240, what is the CIDR notation?

A. /26
B. /29
C. /27
D. /28

6 Which protocol is primarily used for resolving domain names to IP addresses?

A. DHCP
B. DNS
C. FTP
D. ARP

7 In the TCP/IP model, which protocol provides reliable, connection-oriented data delivery?

A. TCP
B. UDP
C. Ethernet
D. IP

8 What is the standard port number for unencrypted HTTP traffic?

A. 21
B. 443
C. 25
D. 80

9 If a network has a subnet mask of /26, how many usable host IP addresses are available per subnet?

A. 62
B. 32
C. 64
D. 30

10 Which network topology features a central node (hub or switch) to which all other nodes are individually connected?

A. Ring
B. Bus
C. Mesh
D. Star

11 Which of the following is an Application Layer protocol used for sending emails?

A. IMAP
B. SNMP
C. POP3
D. SMTP

12 In data encapsulation, what is the Protocol Data Unit (PDU) called at the Transport Layer when using TCP?

A. Segment
B. Bit
C. Packet
D. Frame

13 What is the primary difference between POP3 and IMAP?

A. POP3 generally downloads and deletes mail from the server, while IMAP syncs mail across multiple devices.
B. POP3 sends mail, IMAP receives mail.
C. POP3 runs on port 80, while IMAP runs on port 25.
D. IMAP is unsecured, while POP3 uses encryption.

14 Which layer of the OSI model deals with physical addressing (MAC addresses)?

A. Physical Layer
B. Network Layer
C. Transport Layer
D. Data Link Layer

15 Calculate the broadcast address for the network 192.168.10.0/25.

A. 192.168.10.128
B. 192.168.10.127
C. 192.168.10.255
D. 192.168.10.100

16 Which FTP command connection port is traditionally used to control the conversation?

A. 23
B. 22
C. 20
D. 21

17 In a Bus Topology, what is needed at both ends of the cable to prevent signal reflection?

A. Router
B. Terminator
C. Amplifier
D. Bridge

18 Which device operates primarily at the Physical Layer of the OSI model?

A. Hub
B. Router
C. Switch
D. Gateway

19 What is the purpose of the DHCP protocol?

A. To transfer files securely.
B. To automatically assign IP addresses and configuration parameters to hosts.
C. To send email messages.
D. To translate domain names to IP addresses.

20 If an IP address is Class B, what is the default subnet mask?

A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255

21 Which HTTP method is used to submit data to be processed to a specified resource, often causing a change in state or side effects on the server?

A. POST
B. HEAD
C. GET
D. OPTIONS

22 What is the transmission mode where communication is unidirectional (one-way only)?

A. Half-Duplex
B. Simplex
C. Full-Duplex
D. Multiplex

23 In the OSI model, which layer is responsible for encryption, decryption, compression, and formatting of data?

A. Transport Layer
B. Session Layer
C. Application Layer
D. Presentation Layer

24 Given the IP 172.16.0.0/12, how many bits are borrowed from the host portion if the default classful mask is used as the baseline?

A. 0
B. 6
C. 2
D. 4

25 How many bits are 'borrowed' from the host portion to create subnets if a Class C network uses a /27 subnet mask?

A. 3
B. 5
C. 2
D. 4

26 Which header field in an IP packet prevents infinite looping of packets?

A. Time to Live (TTL)
B. Sequence Number
C. Acknowledgment Number
D. Checksum

27 Which component of a URL identifies the specific protocol to be used?

A. Path
B. Scheme
C. Query String
D. Domain Name

28 Which of the following describes a Ring Topology?

A. Each node connects to exactly two other nodes, forming a closed loop.
B. Each node connects to every other node.
C. All nodes connect to a central device.
D. All nodes connect to a single central cable.

29 Which type of twisted pair cable provides better protection against electromagnetic interference (EMI)?

A. UTP (Unshielded Twisted Pair)
B. Coaxial
C. STP (Shielded Twisted Pair)
D. Fiber Optic

30 In the DORA process of DHCP, what does the 'O' stand for?

A. Offer
B. Optimize
C. Obtain
D. Open

31 What is the decimal equivalent of the binary IP octet 11000000?

A. 128
B. 168
C. 192
D. 224

32 Which protocol is connectionless and does not guarantee delivery?

A. TCP
B. SMTP
C. UDP
D. FTP

33 In a router, what is the function of the Routing Table?

A. To assign IP addresses to clients.
B. To list routes to particular network destinations and associated metrics.
C. To store MAC addresses of connected devices.
D. To encrypt data packets.

34 What is the maximum data payload size (MTU) typically for an Ethernet frame?

A. 1500 bytes
B. 64 bytes
C. 1024 bytes
D. 65535 bytes

35 Which DNS record type maps a hostname to an IPv6 address?

A. CNAME
B. AAAA
C. A
D. MX

36 When Subnetting, which part of the IP address is manipulated to create subnets?

A. The Network bits
B. The Protocol bits
C. The Host bits
D. The Version bits

37 Which of the following is a private IP address range (RFC 1918)?

A. 8.8.8.0 - 8.8.8.255
B. 128.0.0.0 - 128.255.255.255
C. 172.16.0.0 - 172.31.255.255
D. 11.0.0.0 - 11.255.255.255

38 What is the primary function of the Presentation Layer in the OSI model?

A. End-to-end connection
B. Syntax and Semantics of information
C. Framing
D. Routing

39 In the TCP/IP model, the 'Internet' layer corresponds to which layer of the OSI model?

A. Session
B. Transport
C. Data Link
D. Network

40 Which command is used to test the reachability of a host on an IP network?

A. netstat
B. nslookup
C. ipconfig
D. ping

41 Which status code class in HTTP indicates a successful request?

A. 4xx
B. 5xx
C. 3xx
D. 2xx

42 What happens if a collision occurs in a network using CSMA/CD?

A. The priority of the packet is increased.
B. The transmitting nodes stop, wait for a random time, and retransmit.
C. The switch buffers the data.
D. The data is accepted by the receiver.

43 Which networking device breaks a collision domain but maintains a single broadcast domain (by default)?

A. Hub
B. Switch
C. Router
D. Repeater

44 The combination of an IP address and a Port number is known as a:

A. Session
B. Gateway
C. Socket
D. Packet

45 Using the formula , what is the calculated number of hosts for a /30 subnet?

A. 2
B. 4
C. 6
D. 30

46 Which of the following is NOT a valid private IP address?

A. 172.20.10.1
B. 10.50.20.1
C. 192.168.100.5
D. 8.8.4.4

47 What is the hexadecimal representation of the MAC address length?

A. 48-bit
B. 128-bit
C. 64-bit
D. 32-bit

48 In a client-server architecture using HTTP, which entity initiates the request?

A. Router
B. DNS
C. Client
D. Server

49 Which device connects different networks together and uses IP addresses to determine the best path for data?

A. Repeater
B. Router
C. Bridge
D. Switch

50 What is the function of the DNS 'MX' record?

A. Maps a host to an IP.
B. Stores text-based information.
C. Specifies the mail server responsible for accepting email on behalf of a domain.
D. Creates an alias for a domain name.