Unit 2 - Practice Quiz

CSE357 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following formulas represents the number of links required in a fully connected mesh topology with devices?

A.
B.
C.
D.

2 Which layer of the OSI model is responsible for logical addressing and routing?

A. Data Link Layer
B. Transport Layer
C. Network Layer
D. Session Layer

3 In the context of IPv4, what is the length of an IP address in bits?

A. 32 bits
B. 48 bits
C. 64 bits
D. 128 bits

4 Which transmission medium uses light pulses to transmit data and relies on the principle of total internal reflection?

A. Coaxial Cable
B. Shielded Twisted Pair (STP)
C. Fiber Optic Cable
D. Unshielded Twisted Pair (UTP)

5 Given a subnet mask of 255.255.255.240, what is the CIDR notation?

A. /26
B. /27
C. /28
D. /29

6 Which protocol is primarily used for resolving domain names to IP addresses?

A. DHCP
B. DNS
C. ARP
D. FTP

7 In the TCP/IP model, which protocol provides reliable, connection-oriented data delivery?

A. UDP
B. IP
C. TCP
D. Ethernet

8 What is the standard port number for unencrypted HTTP traffic?

A. 21
B. 25
C. 80
D. 443

9 If a network has a subnet mask of /26, how many usable host IP addresses are available per subnet?

A. 64
B. 62
C. 32
D. 30

10 Which network topology features a central node (hub or switch) to which all other nodes are individually connected?

A. Bus
B. Ring
C. Star
D. Mesh

11 Which of the following is an Application Layer protocol used for sending emails?

A. POP3
B. IMAP
C. SMTP
D. SNMP

12 In data encapsulation, what is the Protocol Data Unit (PDU) called at the Transport Layer when using TCP?

A. Bit
B. Frame
C. Packet
D. Segment

13 What is the primary difference between POP3 and IMAP?

A. POP3 sends mail, IMAP receives mail.
B. POP3 generally downloads and deletes mail from the server, while IMAP syncs mail across multiple devices.
C. IMAP is unsecured, while POP3 uses encryption.
D. POP3 runs on port 80, while IMAP runs on port 25.

14 Which layer of the OSI model deals with physical addressing (MAC addresses)?

A. Physical Layer
B. Data Link Layer
C. Network Layer
D. Transport Layer

15 Calculate the broadcast address for the network 192.168.10.0/25.

A. 192.168.10.255
B. 192.168.10.127
C. 192.168.10.128
D. 192.168.10.100

16 Which FTP command connection port is traditionally used to control the conversation?

A. 20
B. 21
C. 22
D. 23

17 In a Bus Topology, what is needed at both ends of the cable to prevent signal reflection?

A. Router
B. Amplifier
C. Terminator
D. Bridge

18 Which device operates primarily at the Physical Layer of the OSI model?

A. Router
B. Switch
C. Hub
D. Gateway

19 What is the purpose of the DHCP protocol?

A. To translate domain names to IP addresses.
B. To automatically assign IP addresses and configuration parameters to hosts.
C. To transfer files securely.
D. To send email messages.

20 If an IP address is Class B, what is the default subnet mask?

A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255

21 Which HTTP method is used to submit data to be processed to a specified resource, often causing a change in state or side effects on the server?

A. GET
B. POST
C. HEAD
D. OPTIONS

22 What is the transmission mode where communication is unidirectional (one-way only)?

A. Simplex
B. Half-Duplex
C. Full-Duplex
D. Multiplex

23 In the OSI model, which layer is responsible for encryption, decryption, compression, and formatting of data?

A. Application Layer
B. Presentation Layer
C. Session Layer
D. Transport Layer

24 Given the IP 172.16.0.0/12, how many bits are borrowed from the host portion if the default classful mask is used as the baseline?

A. 2
B. 4
C. 6
D. 0

25 How many bits are 'borrowed' from the host portion to create subnets if a Class C network uses a /27 subnet mask?

A. 2
B. 3
C. 4
D. 5

26 Which header field in an IP packet prevents infinite looping of packets?

A. Sequence Number
B. Acknowledgment Number
C. Time to Live (TTL)
D. Checksum

27 Which component of a URL identifies the specific protocol to be used?

A. Domain Name
B. Scheme
C. Path
D. Query String

28 Which of the following describes a Ring Topology?

A. All nodes connect to a single central cable.
B. Each node connects to exactly two other nodes, forming a closed loop.
C. All nodes connect to a central device.
D. Each node connects to every other node.

29 Which type of twisted pair cable provides better protection against electromagnetic interference (EMI)?

A. UTP (Unshielded Twisted Pair)
B. STP (Shielded Twisted Pair)
C. Coaxial
D. Fiber Optic

30 In the DORA process of DHCP, what does the 'O' stand for?

A. Open
B. Offer
C. Obtain
D. Optimize

31 What is the decimal equivalent of the binary IP octet 11000000?

A. 192
B. 168
C. 128
D. 224

32 Which protocol is connectionless and does not guarantee delivery?

A. TCP
B. FTP
C. UDP
D. SMTP

33 In a router, what is the function of the Routing Table?

A. To assign IP addresses to clients.
B. To store MAC addresses of connected devices.
C. To list routes to particular network destinations and associated metrics.
D. To encrypt data packets.

34 What is the maximum data payload size (MTU) typically for an Ethernet frame?

A. 1024 bytes
B. 1500 bytes
C. 64 bytes
D. 65535 bytes

35 Which DNS record type maps a hostname to an IPv6 address?

A. A
B. AAAA
C. CNAME
D. MX

36 When Subnetting, which part of the IP address is manipulated to create subnets?

A. The Network bits
B. The Host bits
C. The Version bits
D. The Protocol bits

37 Which of the following is a private IP address range (RFC 1918)?

A. 172.16.0.0 - 172.31.255.255
B. 8.8.8.0 - 8.8.8.255
C. 11.0.0.0 - 11.255.255.255
D. 128.0.0.0 - 128.255.255.255

38 What is the primary function of the Presentation Layer in the OSI model?

A. Routing
B. Framing
C. Syntax and Semantics of information
D. End-to-end connection

39 In the TCP/IP model, the 'Internet' layer corresponds to which layer of the OSI model?

A. Data Link
B. Network
C. Transport
D. Session

40 Which command is used to test the reachability of a host on an IP network?

A. ipconfig
B. netstat
C. ping
D. nslookup

41 Which status code class in HTTP indicates a successful request?

A. 2xx
B. 3xx
C. 4xx
D. 5xx

42 What happens if a collision occurs in a network using CSMA/CD?

A. The data is accepted by the receiver.
B. The transmitting nodes stop, wait for a random time, and retransmit.
C. The switch buffers the data.
D. The priority of the packet is increased.

43 Which networking device breaks a collision domain but maintains a single broadcast domain (by default)?

A. Hub
B. Switch
C. Router
D. Repeater

44 The combination of an IP address and a Port number is known as a:

A. Socket
B. Packet
C. Session
D. Gateway

45 Using the formula , what is the calculated number of hosts for a /30 subnet?

A. 2
B. 4
C. 6
D. 30

46 Which of the following is NOT a valid private IP address?

A. 10.50.20.1
B. 192.168.100.5
C. 172.20.10.1
D. 8.8.4.4

47 What is the hexadecimal representation of the MAC address length?

A. 32-bit
B. 48-bit
C. 64-bit
D. 128-bit

48 In a client-server architecture using HTTP, which entity initiates the request?

A. Server
B. Client
C. DNS
D. Router

49 Which device connects different networks together and uses IP addresses to determine the best path for data?

A. Bridge
B. Repeater
C. Switch
D. Router

50 What is the function of the DNS 'MX' record?

A. Maps a host to an IP.
B. Specifies the mail server responsible for accepting email on behalf of a domain.
C. Creates an alias for a domain name.
D. Stores text-based information.