0% found this document useful (0 votes)
3 views48 pages

Networking

The document outlines the OSI model, detailing its 7 layers and their respective functions. It includes questions and answers about responsibilities such as end-to-end communication, error detection, and data transmission. Key layers discussed include the Transport, Network, Data Link, and Physical layers, along with their roles in networking protocols.

Uploaded by

aksharadeepa2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views48 pages

Networking

The document outlines the OSI model, detailing its 7 layers and their respective functions. It includes questions and answers about responsibilities such as end-to-end communication, error detection, and data transmission. Key layers discussed include the Transport, Network, Data Link, and Physical layers, along with their roles in networking protocols.

Uploaded by

aksharadeepa2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

NETWORKING

OSI

1.​ What is the total number of layers in the OSI model?​

○​ a) 7
○​ b) 5
○​ c) 8
○​ d) 9​
Answer: a) 7
2.​ Which layer of the OSI model is responsible for end-to-end communication?​

○​ a) Network Layer
○​ b) Transport Layer
○​ c) Data Link Layer
○​ d) Application Layer​
Answer: b) Transport Layer
3.​ Which OSI layer is responsible for establishing, maintaining, and terminating
connections?​

○​ a) Session Layer
○​ b) Application Layer
○​ c) Data Link Layer
○​ d) Network Layer​
Answer: a) Session Layer
4.​ Which OSI layer is responsible for error detection and correction?​

○​ a) Network Layer
○​ b) Data Link Layer
○​ c) Application Layer
○​ d) Transport Layer​
Answer: b) Data Link Layer
5.​ At which layer of the OSI model does IP addressing occur?​

○​ a) Network Layer
○​ b) Transport Layer
○​ c) Data Link Layer
○​ d) Application Layer​
Answer: a) Network Layer
6.​ Which layer is responsible for data encryption and decryption in the OSI model?​

○​ a) Application Layer
○​ b) Presentation Layer
○​ c) Transport Layer
○​ d) Network Layer​
Answer: b) Presentation Layer
7.​ Which OSI layer manages network routing?​

○​ a) Data Link Layer


○​ b) Application Layer
○​ c) Network Layer
○​ d) Transport Layer​
Answer: c) Network Layer
8.​ Which of the following is the role of the Transport Layer in the OSI model?​

○​ a) To define physical connections


○​ b) To ensure reliable data delivery
○​ c) To route data packets across networks
○​ d) To present data in a format that can be understood by the application​
Answer: b) To ensure reliable data delivery
9.​ Which OSI layer is responsible for the actual transmission of data bits over the
physical medium?​

○​ a) Physical Layer
○​ b) Transport Layer
○​ c) Application Layer
○​ d) Data Link Layer​
Answer: a) Physical Layer
10.​Which OSI layer provides logical addressing and routing services?​

○​ a) Application Layer
○​ b) Network Layer
○​ c) Transport Layer
○​ d) Data Link Layer​
Answer: b) Network Layer

11.​Which layer of the OSI model is responsible for the logical addressing of devices?
●​ a) Network Layer
●​ b) Data Link Layer
●​ c) Transport Layer
●​ d) Physical Layer​
Answer: a) Network Layer
12. which layer of the OSI model provides the services for end-to-end
communication between devices?

●​ a) Application Layer
●​ b) Transport Layer
●​ c) Network Layer
●​ d) Session Layer​
Answer: b) Transport Layer
13.​Which layer is responsible for establishing, maintaining, and terminating
communication between two devices?
●​ a) Session Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: a) Session Layer
14.​Which layer in the OSI model is primarily responsible for segmenting and
reassembling data?
●​ a) Application Layer
●​ b) Transport Layer
●​ c) Data Link Layer
●​ d) Network Layer​
Answer: b) Transport Layer
15.​Which layer in the OSI model is responsible for converting data into a format that
can be transmitted on the network?
●​ a) Physical Layer
●​ b) Application Layer
●​ c) Presentation Layer
●​ d) Network Layer​
Answer: c) Presentation Layer
16.​Which of the following layers does the Data Link Layer communicate with?
●​ a) Network Layer
●​ b) Transport Layer
●​ c) Physical Layer
●​ d) Application Layer​
Answer: c) Physical Layer
17.​At which layer does IP address resolution take place?
●​ a) Application Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Data Link Layer​
Answer: b) Network Layer
18.​Which layer is responsible for determining how data is physically transmitted on
the network?
●​ a) Transport Layer
●​ b) Data Link Layer
●​ c) Physical Layer
●​ d) Session Layer​
Answer: c) Physical Layer
19.​Which layer of the OSI model provides services such as flow control and error
correction for data transmission?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Physical Layer​
Answer: a) Transport Layer
20.​Which layer defines the electrical, mechanical, and functional aspects of the
physical medium for data transmission?
●​ a) Application Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Physical Layer​
Answer: d) Physical Layer
21.​Which of the following is the role of the Application Layer in the OSI model?
●​ a) Encrypts data
●​ b) Provides end-to-end communication
●​ c) Enables communication between network applications
●​ d) Transmits raw bits over the physical medium​
Answer: c) Enables communication between network applications
22.​Which layer is responsible for controlling access to the transmission medium?
●​ a) Network Layer
●​ b) Data Link Layer
●​ c) Application Layer
●​ d) Physical Layer​
Answer: b) Data Link Layer
23.​Which of the following protocols operates at the OSI Application Layer?
●​ a) IP
●​ b) HTTP
●​ c) TCP
●​ d) Ethernet​
Answer: b) HTTP
24.​Which layer is responsible for managing data compression and encryption?
●​ a) Presentation Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: a) Presentation Layer
25.​Which layer of the OSI model is responsible for providing an interface for
applications to use network services?
●​ a) Network Layer
●​ b) Application Layer
●​ c) Transport Layer
●​ d) Session Layer​
Answer: b) Application Layer
26.​Which layer of the OSI model is responsible for breaking down data into packets
for routing?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Application Layer​
Answer: b) Network Layer
27.​Which protocol is typically used at the OSI Transport Layer?
●​ a) HTTP
●​ b) DNS
●​ c) TCP
●​ d) IP​
Answer: c) TCP
28.​Which of the following services is provided by the Transport Layer of the OSI
model?
●​ a) Routing
●​ b) Segmentation
●​ c) Frame synchronization
●​ d) Physical addressing​
Answer: b) Segmentation
29.​Which of the following tasks is performed by the Data Link Layer in the OSI
model?
●​ a) Routing of data packets
●​ b) Error detection and correction
●​ c) Data segmentation
●​ d) Logical addressing​
Answer: b) Error detection and correction
30.​What type of addresses are used at the Data Link Layer of the OSI model?
●​ a) IP addresses
●​ b) MAC addresses
●​ c) Port numbers
●​ d) Domain names​
Answer: b) MAC addresses
31.​Which OSI layer is responsible for providing transparency to the upper layers in
terms of data transmission?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Session Layer
●​ d) Physical Layer​
Answer: a) Data Link Layer
32.​Which of the following is a function of the Session Layer?
●​ a) Establishes, manages, and terminates sessions
●​ b) Ensures reliable data transfer
●​ c) Routes data packets
●​ d) Encrypts data​
Answer: a) Establishes, manages, and terminates sessions
33.​Which layer of the OSI model ensures that data is delivered in the correct order?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Session Layer​
Answer: c) Transport Layer
34.​Which protocol operates at the Transport Layer of the OSI model?
●​ a) TCP
●​ b) DNS
●​ c) ICMP
●​ d) ARP​
Answer: a) TCP
35.​Which of the following is the primary responsibility of the Network Layer in the
OSI model?
●​ a) Ensuring error-free data transfer
●​ b) Routing data packets across different networks
●​ c) Providing end-to-end communication
●​ d) Providing encryption services​
Answer: b) Routing data packets across different networks
36.​Which layer of the OSI model performs error detection and recovery in data
transmission?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Physical Layer​
Answer: c) Data Link Layer
37.​What does the Physical Layer define?
●​ a) Error handling and flow control
●​ b) The process of breaking data into smaller units
●​ c) The physical means of data transmission such as cables, switches, and voltages
●​ d) The logical structure of addressing​
Answer: c) The physical means of data transmission such as cables, switches, and
voltages
38.​Which of the following protocols operates at the OSI Physical Layer?
●​ a) Ethernet
●​ b) HTTP
●​ c) Wi-Fi
●​ d) ARP​
Answer: c) Wi-Fi
39.​In which layer of the OSI model do routers operate?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: b) Network Layer
40.​Which of the following tasks is managed by the Data Link Layer?
●​ a) Transmission of data packets
●​ b) Logical addressing of devices
●​ c) Error detection and correction
●​ d) Routing data packets across the network​
Answer: c) Error detection and correction
41.​Which of the following describes a characteristic of the OSI Physical Layer?
●​ a) Defines how data is formatted for transmission
●​ b) Provides encryption and compression services
●​ c) Deals with the transmission of raw bit streams over a physical medium
●​ d) Provides segmentation and reassembly of data​
Answer: c) Deals with the transmission of raw bit streams over a physical medium
42.​Which OSI layer is responsible for breaking data into smaller packets for
transmission?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Physical Layer​
Answer: a) Transport Layer
43.​At which OSI layer are IP addresses and subnet masks utilized?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: b) Network Layer
44.​Which of the following describes the responsibility of the Presentation Layer in
the OSI model?
●​ a) Manages end-to-end communication
●​ b) Provides data encryption and compression
●​ c) Routes data packets across networks
●​ d) Defines how data is transmitted on the physical medium​
Answer: b) Provides data encryption and compression
45.​Which OSI layer is responsible for routing packets based on IP addresses?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Session Layer
●​ d) Data Link Layer​
Answer: b) Network Layer
46.​Which layer in the OSI model is concerned with the encoding and decoding of
data for the network?
●​ a) Data Link Layer
●​ b) Presentation Layer
●​ c) Network Layer
●​ d) Application Layer​
Answer: b) Presentation Layer
47.​Which of the following is true about the OSI model?
●​ a) It is a layered framework for network protocols and services
●​ b) It is a model used for designing hardware devices
●​ c) It defines the physical characteristics of network cables
●​ d) It is used to define IP addressing​
Answer: a) It is a layered framework for network protocols and services
48.​Which layer of the OSI model provides services to the application software?
●​ a) Transport Layer
●​ b) Application Layer
●​ c) Data Link Layer
●​ d) Network Layer​
Answer: b) Application Layer
49.​Which OSI layer is responsible for the physical connection between two devices?
●​ a) Transport Layer
●​ b) Data Link Layer
●​ c) Physical Layer
●​ d) Application Layer​
Answer: c) Physical Layer
50.​What function does the Transport Layer perform in the OSI model?
●​ a) Segments and reassembles data
●​ b) Provides error correction
●​ c) Establishes and maintains sessions
●​ d) Routes data packets​
Answer: a) Segments and reassembles data
51.​At which OSI layer do switches typically operate?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Physical Layer
●​ d) Transport Layer​
Answer: a) Data Link Layer
52.​Which layer handles the acknowledgment of successfully received data?
●​ a) Data Link Layer
●​ b) Application Layer
●​ c) Transport Layer
●​ d) Network Layer​
Answer: c) Transport Layer
53.​Which of the following is the correct order of the OSI model layers from bottom to
top?
●​ a) Application, Presentation, Session, Transport, Network, Data Link, Physical
●​ b) Physical, Data Link, Network, Transport, Session, Presentation, Application
●​ c) Data Link, Network, Transport, Application, Presentation, Session
●​ d) Transport, Network, Data Link, Application, Presentation, Session​
Answer: b) Physical, Data Link, Network, Transport, Session, Presentation, Application
54.​What does the Transport Layer use to manage data flow between devices?
●​ a) Routing tables
●​ b) Flow control mechanisms
●​ c) MAC addresses
●​ d) IP addresses​
Answer: b) Flow control mechanisms
55.​Which OSI layer is responsible for checking and maintaining the integrity of data
during transmission?
●​ a) Physical Layer
●​ b) Data Link Layer
●​ c) Network Layer
●​ d) Transport Layer​
Answer: d) Transport Layer
56.​Which of the following is a function of the Application Layer in the OSI model?
●​ a) Data encryption and compression
●​ b) Segmentation of data packets
●​ c) Routing of data packets
●​ d) Interaction with end-user software​
Answer: d) Interaction with end-user software
57.​Which layer defines the format, syntax, and semantics of the transmitted data?
●​ a) Presentation Layer
●​ b) Data Link Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: a) Presentation Layer
58.​At which OSI layer does TCP perform error checking?
●​ a) Network Layer
●​ b) Transport Layer
●​ c) Data Link Layer
●​ d) Application Layer​
Answer: b) Transport Layer
59.​Which OSI layer manages the transmission of raw bits over a communication
medium?
●​ a) Application Layer
●​ b) Data Link Layer
●​ c) Physical Layer
●​ d) Network Layer​
Answer: c) Physical Layer
60.​Which layer manages the logical communication between devices in a network?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Session Layer​
Answer: b) Network Layer
61.​Which protocol operates at the OSI Data Link Layer?
●​ a) IP
●​ b) HTTP
●​ c) Ethernet
●​ d) TCP​
Answer: c) Ethernet
62.​Which OSI layer is responsible for data encapsulation?
●​ a) Transport Layer
●​ b) Data Link Layer
●​ c) Application Layer
●​ d) Physical Layer​
Answer: b) Data Link Layer
63.​Which OSI layer provides end-to-end communication and flow control?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Application Layer
●​ d) Session Layer​
Answer: a) Transport Layer
64.​Which OSI layer ensures that data is correctly formatted and presented to the
application?
●​ a) Presentation Layer
●​ b) Transport Layer
●​ c) Network Layer
●​ d) Data Link Layer​
Answer: a) Presentation Layer
65.​Which of the following is an example of a protocol that operates at the OSI
Network Layer?
●​ a) IP
●​ b) HTTP
●​ c) TCP
●​ d) Ethernet​
Answer: a) IP
66.​At which layer is data converted into packets for transmission across a network?
●​ a) Application Layer
●​ b) Data Link Layer
●​ c) Network Layer
●​ d) Transport Layer​
Answer: c) Network Layer
67.​Which layer is responsible for determining if the physical link is functioning
correctly?
●​ a) Network Layer
●​ b) Data Link Layer
●​ c) Transport Layer
●​ d) Physical Layer​
Answer: b) Data Link Layer
68.​Which of the following protocols operates at the OSI Transport Layer?
●​ a) FTP
●​ b) HTTP
●​ c) UDP
●​ d) IP​
Answer: c) UDP
69.​Which layer is responsible for session establishment and maintenance?
●​ a) Application Layer
●​ b) Session Layer
●​ c) Data Link Layer
●​ d) Transport Layer​
Answer: b) Session Layer
70.​At which OSI layer do IP addresses exist?
●​ a) Network Layer
●​ b) Data Link Layer
●​ c) Physical Layer
●​ d) Transport Layer​
Answer: a) Network Layer
71.​Which layer is responsible for the physical addressing of devices in a network?
●​ a) Application Layer
●​ b) Data Link Layer
●​ c) Transport Layer
●​ d) Network Layer​
Answer: b) Data Link Layer
72.​Which OSI layer provides error detection, error correction, and flow control?
●​ a) Network Layer
●​ b) Transport Layer
●​ c) Data Link Layer
●​ d) Session Layer​
Answer: c) Data Link Layer
73.​Which of the following is a responsibility of the Data Link Layer in the OSI model?
●​ a) Routing data between different networks
●​ b) Converting data into electrical signals
●​ c) Formatting and framing data for transmission
●​ d) Encrypting the data​
Answer: c) Formatting and framing data for transmission
74.​At which layer does SSL/TLS operate?
●​ a) Application Layer
●​ b) Presentation Layer
●​ c) Session Layer
●​ d) Transport Layer​
Answer: b) Presentation Layer
75.​Which layer of the OSI model is responsible for determining the best physical path
for data?
●​ a) Network Layer
●​ b) Transport Layer
●​ c) Data Link Layer
●​ d) Session Layer​
Answer: a) Network Layer
76.​Which layer in the OSI model is responsible for routing data from the source to the
destination device across multiple networks?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Session Layer​
Answer: b) Network Layer
77.​Which of the following devices operates at the Data Link Layer?
●​ a) Router
●​ b) Switch
●​ c) Hub
●​ d) Gateway​
Answer: b) Switch
78.​Which layer in the OSI model deals with physical addresses (MAC addresses)?
●​ a) Transport Layer
●​ b) Data Link Layer
●​ c) Network Layer
●​ d) Physical Layer​
Answer: b) Data Link Layer
79.​Which of the following is NOT an OSI layer?
●​ a) Application Layer
●​ b) Session Layer
●​ c) Protocol Layer
●​ d) Transport Layer​
Answer: c) Protocol Layer
80.​At which layer does packet switching occur?
●​ a) Application Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Transport Layer​
Answer: b) Network Layer
81.​What is the purpose of the Transport Layer in the OSI model?
●​ a) Provides a means for end-to-end communication
●​ b) Defines how bits are transmitted across the network
●​ c) Defines how data is formatted for the application
●​ d) Provides encryption and compression services​
Answer: a) Provides a means for end-to-end communication
82.​Which OSI layer is responsible for session establishment, management, and
termination?
●​ a) Transport Layer
●​ b) Data Link Layer
●​ c) Session Layer
●​ d) Application Layer​
Answer: c) Session Layer
83.​Which layer of the OSI model uses IP addresses for logical addressing?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: b) Network Layer
84.​Which layer of the OSI model is responsible for translating data between different
application formats?
●​ a) Presentation Layer
●​ b) Transport Layer
●​ c) Data Link Layer
●​ d) Network Layer​
Answer: a) Presentation Layer
85.​What is the primary function of the Session Layer?
●​ a) Provides encryption and compression
●​ b) Provides a communication channel for applications
●​ c) Transmits data over the physical medium
●​ d) Ensures that data arrives in sequence and manages sessions​
Answer: d) Ensures that data arrives in sequence and manages sessions
86.​Which layer of the OSI model does the ARP protocol operate at?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: a) Data Link Layer
87.​Which of the following is the function of the Physical Layer in the OSI model?
●​ a) Defines the structure and meaning of data
●​ b) Encodes and decodes data into a format suitable for transmission
●​ c) Provides encryption and compression
●​ d) Determines how data is physically transmitted​
Answer: d) Determines how data is physically transmitted
88.​Which layer is responsible for the segmentation and reassembly of data?
●​ a) Data Link Layer
●​ b) Network Layer
●​ c) Transport Layer
●​ d) Application Layer​
Answer: c) Transport Layer
89.​At which layer does IP packet forwarding occur?
●​ a) Network Layer
●​ b) Transport Layer
●​ c) Data Link Layer
●​ d) Application Layer​
Answer: a) Network Layer
90.​Which layer of the OSI model is responsible for ensuring data integrity during
transmission?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Session Layer​
Answer: a) Transport Layer
91.​Which OSI layer is responsible for managing logical addresses (e.g., IP
addresses)?
●​ a) Transport Layer
●​ b) Application Layer
●​ c) Network Layer
●​ d) Data Link Layer​
Answer: c) Network Layer
92.​Which of the following devices operates at the OSI Physical Layer?
●​ a) Hub
●​ b) Switch
●​ c) Router
●​ d) Bridge​
Answer: a) Hub
93.​Which of the following is an example of a protocol operating at the Presentation
Layer?
●​ a) HTTP
●​ b) FTP
●​ c) SSL/TLS
●​ d) ARP​
Answer: c) SSL/TLS
94.​Which layer of the OSI model is responsible for the overall communication
between different applications?
●​ a) Data Link Layer
●​ b) Application Layer
●​ c) Network Layer
●​ d) Session Layer​
Answer: b) Application Layer
95.​Which OSI layer is concerned with converting a stream of data into frames for
transmission?
●​ a) Network Layer
●​ b) Data Link Layer
●​ c) Transport Layer
●​ d) Physical Layer​
Answer: b) Data Link Layer
96.​Which layer manages the flow of data in case of congestion?
●​ a) Data Link Layer
●​ b) Application Layer
●​ c) Transport Layer
●​ d) Network Layer​
Answer: c) Transport Layer
97.​Which layer of the OSI model provides a standard way of communicating between
devices in a network?
●​ a) Application Layer
●​ b) Data Link Layer
●​ c) Transport Layer
●​ d) Session Layer​
Answer: b) Data Link Layer
98.​Which layer of the OSI model defines the logical structure of addressing?
●​ a) Network Layer
●​ b) Data Link Layer
●​ c) Transport Layer
●​ d) Physical Layer​
Answer: a) Network Layer
99.​Which layer of the OSI model handles packet retransmission in case of error?
●​ a) Transport Layer
●​ b) Network Layer
●​ c) Data Link Layer
●​ d) Physical Layer​
Answer: a) Transport Layer
100.​ Which OSI layer is responsible for establishing and maintaining connections
between different networks?
●​ a) Network Layer
●​ b) Transport Layer
●​ c) Session Layer
●​ d) Data Link Layer​
Answer: a) Network Layer
TCP
1.​ What is the primary function of the TCP protocol?​

○​ a) Provides error detection and correction


○​ b) Routes packets across the network
○​ c) Ensures reliable, ordered delivery of data
○​ d) Manages the physical connection between devices Answer: c) Ensures
reliable, ordered delivery of data
2.​ TCP operates at which layer of the OSI model?​

○​ a) Data Link Layer


○​ b) Transport Layer
○​ c) Network Layer
○​ d) Application Layer​
Answer: b) Transport Layer
3.​ Which type of communication does TCP provide?​

○​ a) Unreliable, connectionless communication


○​ b) Reliable, connection-oriented communication
○​ c) Reliable, connectionless communication
○​ d) Unreliable, connection-oriented communication​
Answer: b) Reliable, connection-oriented communication
4.​ Which of the following is a key feature of TCP?​

○​ a) No error detection
○​ b) Connection-oriented communication
○​ c) No flow control
○​ d) Data is sent in a continuous stream​
Answer: b) Connection-oriented communication
5.​ What is the initial state of a TCP connection?​

○​ a) SYN_SENT
○​ b) LISTEN
○​ c) CLOSED
○​ d) ESTABLISHED​
Answer: c) CLOSED
6.​ Which TCP flag is used to initiate a connection?​

○​ a) FIN
○​ b) SYN
○​ c) RST
○​ d) ACK​
Answer: b) SYN
7.​ What is the purpose of the ACK flag in TCP?​

○​ a) To acknowledge the receipt of data


○​ b) To establish a connection
○​ c) To terminate a connection
○​ d) To request a retransmission​
Answer: a) To acknowledge the receipt of data
8.​ Which of the following is used by TCP for flow control?​

○​ a) Window size
○​ b) Sequence number
○​ c) Checksum
○​ d) Timeout interval​
Answer: a) Window size
9.​ In TCP, what does the term "Three-Way Handshake" refer to?​

○​ a) A process to terminate a connection


○​ b) A method for sending large amounts of data
○​ c) A technique for establishing a connection between two hosts
○​ d) A method to check data integrity​
Answer: c) A technique for establishing a connection between two hosts
10.​What is the purpose of the SYN and ACK flags during the Three-Way
Handshake?​

●​ a) To synchronize data between sender and receiver


●​ b) To terminate the connection
●​ c) To ensure the data is sent in the correct order
●​ d) To detect errors in the data​
Answer: a) To synchronize data between sender and receiver
11.​Which of the following does TCP use to ensure reliable delivery of data?
●​ a) Acknowledgments and retransmissions
●​ b) Data encryption
●​ c) Priority scheduling
●​ d) Data fragmentation​
Answer: a) Acknowledgments and retransmissions
12.​Which TCP segment field indicates the position of the first byte of data in
the segment?
●​ a) Sequence Number
●​ b) Acknowledgment Number
●​ c) Window Size
●​ d) Checksum​
Answer: a) Sequence Number
13.​In TCP, which value in the segment indicates the next expected byte?
●​ a) Acknowledgment Number
●​ b) Sequence Number
●​ c) Window Size
●​ d) Flags​
Answer: a) Acknowledgment Number
14.​How does TCP handle lost or corrupted packets?
●​ a) It discards the lost packet and waits for new data
●​ b) It uses acknowledgments to request retransmission
●​ c) It uses error correction codes to recover lost packets
●​ d) It automatically resends all previous packets​
Answer: b) It uses acknowledgments to request retransmission
15.​What is the maximum segment size (MSS) in TCP?
●​ a) The maximum number of packets that can be transmitted
●​ b) The maximum size of the TCP header
●​ c) The maximum size of data that can be sent in a TCP segment
●​ d) The maximum number of retransmissions allowed​
Answer: c) The maximum size of data that can be sent in a TCP segment
16.​Which of the following TCP states corresponds to a fully established
connection?
●​ a) SYN_SENT
●​ b) CLOSED
●​ c) ESTABLISHED
●​ d) LISTEN​
Answer: c) ESTABLISHED
17.​Which of the following describes the purpose of TCP's sliding window
mechanism?
●​ a) To reorder out-of-order packets
●​ b) To manage flow control and ensure data is sent at an appropriate rate
●​ c) To synchronize the sender and receiver
●​ d) To request retransmissions of lost data​
Answer: b) To manage flow control and ensure data is sent at an appropriate
rate
18.​In TCP, what happens if a sender does not receive an acknowledgment for a
transmitted segment within a certain time?
●​ a) The connection is closed
●​ b) The sender resends the segment
●​ c) The sender sends a RST (reset) flag
●​ d) The receiver closes the connection​
Answer: b) The sender resends the segment
19.​How does TCP achieve congestion control?
●​ a) By reducing the transmission rate if packet loss is detected
●​ b) By using a static transmission rate
●​ c) By implementing error correction
●​ d) By prioritizing critical data​
Answer: a) By reducing the transmission rate if packet loss is detected
20.​Which of the following TCP mechanisms is used to reduce congestion in a
network?
●​ a) Sliding window
●​ b) Slow start
●​ c) Retransmission timeout
●​ d) Error correction​
Answer: b) Slow start
21.​What is the role of the TCP FIN flag?
●​ a) To indicate the connection is being established
●​ b) To request the termination of the connection
●​ c) To acknowledge the receipt of data
●​ d) To request a retransmission of lost data​
Answer: b) To request the termination of the connection
22.​Which process does TCP use to gracefully close a connection?
●​ a) TCP Three-Way Handshake
●​ b) TCP Four-Way Handshake
●​ c) Resetting the connection
●​ d) Continuous retransmissions​
Answer: b) TCP Four-Way Handshake
23.​Which TCP flag is used to reset the connection?
●​ a) SYN
●​ b) FIN
●​ c) ACK
●​ d) RST​
Answer: d) RST
24.​What is a TCP segment’s "window size" used for?
●​ a) To limit the amount of data that can be transmitted before acknowledgment
●​ b) To specify the number of retransmissions allowed
●​ c) To store the connection state
●​ d) To determine the maximum size of the data field​
Answer: a) To limit the amount of data that can be transmitted before
acknowledgment
25.​In TCP, what is the purpose of the Sequence Number field?
●​ a) To identify the byte number of the first byte of the segment
●​ b) To specify the expected byte from the receiver
●​ c) To acknowledge the last byte received
●​ d) To provide error detection information​
Answer: a) To identify the byte number of the first byte of the segment
●​ Which of the following best describes the "two-way handshake" in TCP?
●​ a) Used to initiate a connection
●​ b) Used to terminate a connection
●​ c) Used to ensure that the connection is reliable
●​ d) Used to manage flow control​
Answer: b) Used to terminate a connection
27.​In TCP, what does the term "half-open connection" refer to?
●​ a) A connection that is actively being established
●​ b) A connection where only one side has terminated the connection
●​ c) A connection in the process of being initialized
●​ d) A connection waiting for a packet retransmission​
Answer: b) A connection where only one side has terminated the connection
28.​What is the function of the TCP Checksum?
●​ a) To determine the transmission speed
●​ b) To detect errors in the data segment
●​ c) To indicate the sequence of segments
●​ d) To acknowledge received data​
Answer: b) To detect errors in the data segment
29.​Which of the following is a key benefit of TCP's connection-oriented
communication?
●​ a) Faster transmission speeds
●​ b) Guaranteed delivery of data
●​ c) Less complexity in data transmission
●​ d) Lower overhead​
Answer: b) Guaranteed delivery of data
30.​What happens if a TCP segment is lost during transmission?
●​ a) The receiver ignores the loss and continues receiving data
●​ b) The sender assumes the data was delivered successfully
●​ c) The sender retransmits the segment after a timeout
●​ d) The connection is reset immediately​
Answer: c) The sender retransmits the segment after a timeout
31.​Which of the following terms is related to the number of segments a TCP
connection can handle at a given time?
●​ a) Window size
●​ b) Congestion control
●​ c) Sequence number
●​ d) Acknowledgment​
Answer: a) Window size
32.​TCP uses which of the following methods to ensure the correct order of
data?
●​ a) Data fragmentation
●​ b) Sequence numbers
●​ c) Error correction
●​ d) Packet routing​
Answer: b) Sequence numbers
33.​In which state is the TCP connection when it is in the process of being
closed?
●​ a) FIN_WAIT
●​ b) ESTABLISHED
●​ c) TIME_WAIT
●​ d) LISTEN​
Answer: a) FIN_WAIT
34.​Which of the following is an advantage of TCP over UDP?
●​ a) Lower latency
●​ b) Faster data transfer
●​ c) Reliable, ordered delivery of data
●​ d) No error checking​
Answer: c) Reliable, ordered delivery of data
35.​Which is a characteristic of a TCP segment's header?
●​ a) It is fixed in size
●​ b) It includes both a source and destination IP address
●​ c) It contains a checksum for error detection
●​ d) It only contains control flags​
Answer: c) It contains a checksum for error detection
36.​How does TCP handle network congestion?
●​ a) It increases the window size
●​ b) It reduces the window size and transmission rate
●​ c) It increases the sequence number
●​ d) It drops the connection​
Answer: b) It reduces the window size and transmission rate
37.​What does the RST flag in a TCP packet signify?
●​ a) Request for retransmission
●​ b) Acknowledgment of data received
●​ c) Reset of the connection
●​ d) Termination of the connection​
Answer: c) Reset of the connection
38.​Which of the following describes the TCP "slow start" mechanism?
●​ a) Starts the connection with a large window size
●​ b) Gradually increases the window size as packets are successfully delivered
●​ c) Begins with a zero window size
●​ d) Immediately sends the entire window of data​
Answer: b) Gradually increases the window size as packets are successfully
delivered
39.​In the TCP three-way handshake, which state is the server in when it
responds to the client's SYN?
●​ a) SYN_ACK
●​ b) ESTABLISHED
●​ c) SYN_SENT
●​ d) LISTEN​
Answer: a) SYN_ACK
40.​How does TCP ensure the integrity of transmitted data?
●​ a) By using error correction algorithms
●​ b) By using a checksum in each segment
●​ c) By encrypting data
●​ d) By acknowledging received data​
Answer: b) By using a checksum in each segment
41.​Which of the following is true about the window size in TCP?
●​ a) It is a fixed value
●​ b) It limits the number of segments the sender can transmit before receiving an
acknowledgment
●​ c) It increases automatically after each successful transmission
●​ d) It has no effect on the flow of data​
Answer: b) It limits the number of segments the sender can transmit before
receiving an acknowledgment
42.​In TCP, what does the term "round-trip time (RTT)" refer to?
●​ a) The time it takes for data to travel from the sender to the receiver
●​ b) The time it takes for a TCP acknowledgment to travel back to the sender
●​ c) The time to retransmit a lost segment
●​ d) The time for a connection to be established​
Answer: b) The time it takes for a TCP acknowledgment to travel back to the
sender
43.​What is the purpose of the TCP "Timeout" value?
●​ a) To define how long the receiver will wait for data
●​ b) To define how long a sender will wait for an acknowledgment
●​ c) To determine the retransmission interval
●​ d) To set the time for data transmission​
Answer: b) To define how long a sender will wait for an acknowledgment
44.​Which TCP flag is used to request the termination of a connection?
●​ a) SYN
●​ b) ACK
●​ c) FIN
●​ d) RST​
Answer: c) FIN
45.​In TCP, what does the term "flow control" refer to?
●​ a) The process of managing the transmission of data between sender and
receiver
●​ b) The method of ensuring that data is securely transmitted
●​ c) The adjustment of window size based on network congestion
●​ d) The management of retransmission timeouts​
Answer: a) The process of managing the transmission of data between sender
and receiver
46.​Which type of address does TCP use to identify the source and
destination?
●​ a) IP Address
●​ b) MAC Address
●​ c) Port Number
●​ d) IP and Port Number​
Answer: d) IP and Port Number
47.​Which of the following best describes TCP's congestion window?
●​ a) The amount of data the sender can transmit before waiting for an
acknowledgment
●​ b) The fixed number of segments that can be sent
●​ c) The number of packets waiting to be processed by the receiver
●​ d) The maximum packet size that can be transmitted​
Answer: a) The amount of data the sender can transmit before waiting for an
acknowledgment
48.​Which of the following TCP states indicates that the connection is waiting
for data to be acknowledged?
●​ a) ESTABLISHED
●​ b) SYN_SENT
●​ c) TIME_WAIT
●​ d) FIN_WAIT​
Answer: d) FIN_WAIT
49.​What does TCP’s flow control prevent?
●​ a) Data corruption
●​ b) Overwhelming the receiver with too much data
●​ c) Network congestion
●​ d) Segmentation of large data packets​
Answer: b) Overwhelming the receiver with too much data
50.​Which TCP mechanism is used to detect whether a segment is lost?
●​ a) Acknowledgments and timeouts
●​ b) Window size
●​ c) Checksum
●​ d) Sequence numbers​
Answer: a) Acknowledgments and timeouts
●​ Which of the following ensures reliable data delivery in TCP?
●​ a) Sequence numbers
●​ b) Window size
●​ c) Acknowledgments
●​ d) All of the above​
Answer: d) All of the above
52.​What happens if a TCP segment does not receive an acknowledgment
within the timeout period?
●​ a) The segment is discarded
●​ b) The segment is resent
●​ c) The connection is reset
●​ d) The connection is terminated​
Answer: b) The segment is resent
53.​What does the FIN flag in TCP indicate?
●​ a) The data in the segment is valid
●​ b) The sender wants to terminate the connection
●​ c) The sender wants to acknowledge the data
●​ d) The data is corrupted and needs to be retransmitted​
Answer: b) The sender wants to terminate the connection
54.​Which of the following statements about TCP’s three-way handshake is
correct?
●​ a) It involves one SYN and two ACK segments
●​ b) It involves two SYN and one ACK segment
●​ c) It involves two SYN and two ACK segments
●​ d) It involves only SYN segments​
Answer: b) It involves two SYN and one ACK segment
55.​What is the purpose of the TCP “Sliding Window” mechanism?
●​ a) To manage retransmissions
●​ b) To ensure flow control by limiting the amount of data sent
●​ c) To synchronize data transfer between the sender and receiver
●​ d) To prioritize certain segments for faster delivery​
Answer: b) To ensure flow control by limiting the amount of data sent
56.​Which of the following is the correct TCP state when the connection is
being actively terminated by one side?
●​ a) SYN_SENT
●​ b) TIME_WAIT
●​ c) FIN_WAIT_1
●​ d) ESTABLISHED​
Answer: c) FIN_WAIT_1
57.​What is the purpose of the "Window Size" field in a TCP header?
●​ a) To indicate how much data can be sent before requiring an acknowledgment
●​ b) To specify the maximum packet size allowed in a network
●​ c) To show the number of retransmissions allowed
●​ d) To identify the destination port number​
Answer: a) To indicate how much data can be sent before requiring an
acknowledgment
58.​Which of the following is a valid reason for using TCP over UDP?
●​ a) Faster transmission of large data
●​ b) Reliability and data integrity
●​ c) Simpler connection establishment
●​ d) Lower overhead​
Answer: b) Reliability and data integrity
59.​In TCP, what does the acronym "RTT" stand for?
●​ a) Round-Trip Time
●​ b) Real-Time Transmission
●​ c) Rapid Transport Timing
●​ d) Resilient Transfer Time​
Answer: a) Round-Trip Time
60.​Which of the following flags is used by TCP to acknowledge the receipt of data?
●​ a) FIN
●​ b) SYN
●​ c) ACK
●​ d) URG​
Answer: c) ACK
61.​Which of the following defines TCP’s congestion control mechanism?
●​ a) It increases the window size based on network conditions
●​ b) It avoids sending data altogether when congestion occurs
●​ c) It maintains a constant window size
●​ d) It uses priority queueing to transmit important packets​
Answer: a) It increases the window size based on network conditions
62.​What does the TCP RST (Reset) flag indicate?
●​ a) The connection is being initiated
●​ b) The connection is being reset due to an error or failure
●​ c) The sender is requesting retransmission
●​ d) The connection is established successfully​
Answer: b) The connection is being reset due to an error or failure
63.​Which of the following is an essential characteristic of TCP?
●​ a) It provides best-effort delivery
●​ b) It is a connectionless protocol
●​ c) It guarantees the order of delivery
●​ d) It does not implement flow control​
Answer: c) It guarantees the order of delivery
64.​In the TCP three-way handshake, what does the client do in the third step?
●​ a) Sends an ACK to the server
●​ b) Sends a SYN message to the server
●​ c) Acknowledges the receipt of data
●​ d) Sends a FIN message to terminate the connection​
Answer: a) Sends an ACK to the server
65.​What happens during TCP’s “Slow Start” phase?
●​ a) The sender immediately increases the transmission rate
●​ b) The sender begins with a small window size and increases it gradually
●​ c) The connection is terminated if congestion occurs
●​ d) The receiver sends a window size of zero​
Answer: b) The sender begins with a small window size and increases it gradually
66.​In which state is a TCP connection during the establishment of the connection?
●​ a) SYN_SENT
●​ b) CLOSED
●​ c) ESTABLISHED
●​ d) LISTEN​
Answer: a) SYN_SENT
67.​Which TCP state occurs when a connection is actively waiting for data
transmission?
●​ a) TIME_WAIT
●​ b) FIN_WAIT_2
●​ c) ESTABLISHED
●​ d) SYN_ACK​
Answer: c) ESTABLISHED
68.​Which of the following is a key difference between TCP and UDP?
●​ a) TCP guarantees the delivery of data, while UDP does not
●​ b) TCP is faster than UDP
●​ c) UDP has better error correction than TCP
●​ d) UDP uses a connection-oriented approach​
Answer: a) TCP guarantees the delivery of data, while UDP does not
69.​What is the purpose of a TCP "sequence number"?
●​ a) To uniquely identify a segment for retransmission
●​ b) To calculate the checksum for error detection
●​ c) To identify the segment’s position in the byte stream
●​ d) To indicate the acknowledgment number​
Answer: c) To identify the segment’s position in the byte stream
70.​In TCP, the sender uses the "initial sequence number" (ISN) for which purpose?
●​ a) To mark the starting point for the data transfer
●​ b) To check the integrity of the data
●​ c) To indicate the port number
●​ d) To set the connection timeout​
Answer: a) To mark the starting point for the data transfer
71.​Which state of TCP corresponds to waiting for the acknowledgment of a segment
after it has been sent?
●​ a) SYN_SENT
●​ b) LISTEN
●​ c) ESTABLISHED
●​ d) FIN_WAIT_1​
Answer: d) FIN_WAIT_1
72.​How does TCP detect packet loss in a connection?
●​ a) By calculating the checksum of the segment
●​ b) By detecting duplicate acknowledgments
●​ c) By monitoring the sequence number
●​ d) By comparing the time-to-live (TTL) values​
Answer: b) By detecting duplicate acknowledgments
73.​Which of the following is an advantage of TCP’s error detection mechanism?
●​ a) It provides quick retransmission of lost packets
●​ b) It eliminates the need for acknowledgments
●​ c) It speeds up the transmission process
●​ d) It guarantees the data is not corrupted​
Answer: a) It provides quick retransmission of lost packets
74.​When does TCP use the "time-out" value for retransmission?
●​ a) When the receiver has not received data
●​ b) When the sender has not received an acknowledgment for a segment
●​ c) When a segment is too large to fit in the buffer
●​ d) When there is a congestion in the network​
Answer: b) When the sender has not received an acknowledgment for a segment
75.​How does TCP improve data transfer reliability?
●​ a) By sending the data without checking for errors
●​ b) By ensuring that the data is sent in smaller chunks
●​ c) By acknowledging each data segment and retransmitting if needed
●​ d) By using static routing for packet delivery​
Answer: c) By acknowledging each data segment and retransmitting if needed
76.​Which of the following is true about the FIN_WAIT_2 state in TCP?
●​ a) It indicates the sender is waiting for a final acknowledgment after sending a FIN flag
●​ b) It is the initial state during connection establishment
●​ c) It indicates the sender is still actively transmitting data
●​ d) It is used during the Three-Way Handshake​
Answer: a) It indicates the sender is waiting for a final acknowledgment after sending a
FIN flag
77.​In TCP, what does a “duplicate acknowledgment” signal?
●​ a) The receiver has received the segment with no issues
●​ b) A packet was lost and needs to be retransmitted
●​ c) The sender needs to wait for additional data before continuing
●​ d) The connection is about to be closed​
Answer: b) A packet was lost and needs to be retransmitted
78.​What is the typical use case for TCP?
●​ a) Real-time video streaming
●​ b) File transfers and web browsing
●​ c) Sending small, time-sensitive messages
●​ d) Broadcast communication​
Answer: b) File transfers and web browsing
79.​How does TCP handle network congestion?
●​ a) By gradually increasing the transmission rate when no congestion is detected
●​ b) By halting transmission until the congestion clears
●​ c) By sending duplicate segments to force faster delivery
●​ d) By using an exclusive transmission path​
Answer: a) By gradually increasing the transmission rate when no congestion is
detected
80.​What is the relationship between TCP and IP in the OSI model?
●​ a) TCP operates at the Application layer, and IP operates at the Transport layer
●​ b) TCP operates at the Transport layer, and IP operates at the Network layer
●​ c) Both TCP and IP operate at the same layer (Network layer)
●​ d) Both TCP and IP operate at the Application layer​
Answer: b) TCP operates at the Transport layer, and IP operates at the Network layer
81.​What is the maximum segment size (MSS) in TCP?
●​ a) 128 KB
●​ b) 64 KB
●​ c) 1500 bytes
●​ d) 65535 bytes​
Answer: c) 1500 bytes
82.​What role does the TCP "Acknowledgment Number" play?
●​ a) It signifies the first byte of the next segment the receiver is expecting
●​ b) It shows the length of the data being sent
●​ c) It represents the number of retransmissions
●​ d) It identifies the type of data in the segment​
Answer: a) It signifies the first byte of the next segment the receiver is expecting
83.​Which of the following is a characteristic of TCP’s error recovery process?
●​ a) It allows the receiver to correct errors in the data
●​ b) It relies on acknowledgments and retransmissions of lost data
●​ c) It only works with smaller packets
●​ d) It performs automatic encryption of data during transmission​
Answer: b) It relies on acknowledgments and retransmissions of lost data
84.​When does TCP use the "TIME_WAIT" state?
●​ a) When the connection is being established
●​ b) When the connection is being actively used
●​ c) When the connection is waiting for acknowledgment of the termination
●​ d) When a packet has been corrupted and needs to be retransmitted​
Answer: c) When the connection is waiting for acknowledgment of the termination
85.​What is the main function of the TCP sequence number?
●​ a) To provide the window size for data transmission
●​ b) To track the byte number of data being sent
●​ c) To indicate the termination of the connection
●​ d) To control the flow of data between sender and receiver​
Answer: b) To track the byte number of data being sent
86.​What does TCP's sliding window mechanism primarily manage?
●​ a) The maximum segment size
●​ b) The retransmission of lost data
●​ c) The flow of data between sender and receiver
●​ d) The sequence numbers of segments​
Answer: c) The flow of data between sender and receiver
87.​Which TCP state involves the receiver waiting for a segment from the sender?
●​ a) LISTEN
●​ b) ESTABLISHED
●​ c) TIME_WAIT
●​ d) SYN_ACK​
Answer: b) ESTABLISHED
88.​In the TCP three-way handshake, when does the server acknowledge the client's
SYN?
●​ a) During the second step of the handshake
●​ b) After the connection is established
●​ c) During the first step of the handshake
●​ d) During the third step of the handshake​
Answer: a) During the second step of the handshake
89.​Which of the following happens when the receiver's buffer is full in TCP?
●​ a) The sender waits for the acknowledgment before sending more data
●​ b) The sender’s data transmission is paused until there is space available
●​ c) The connection is reset
●​ d) The sender sends data without considering the receiver's buffer​
Answer: b) The sender’s data transmission is paused until there is space available
90.​What is the purpose of TCP's "Urgent Pointer"?
●​ a) To mark high-priority data in a segment
●​ b) To indicate the urgent data that needs immediate transmission
●​ c) To detect congestion in the network
●​ d) To adjust the receiver's buffer size​
Answer: b) To indicate the urgent data that needs immediate transmission

91.​Which of the following is true about TCP’s "slow start" algorithm?


●​ a) It increases the congestion window exponentially until congestion is detected
●​ b) It starts with the largest window size possible and adjusts based on RTT
●​ c) It maintains a constant window size regardless of network conditions
●​ d) It does not use any congestion control techniques​
Answer: a) It increases the congestion window exponentially until congestion is
detected
92.​In TCP, what is the purpose of the "sequence number" field?
●​ a) To assign a unique identifier to each segment
●​ b) To track the order of data in the stream and detect lost or out-of-order segments
●​ c) To indicate the total amount of data sent in the connection
●​ d) To ensure that data is not duplicated​
Answer: b) To track the order of data in the stream and detect lost or out-of-order
segments
93.​Which of the following mechanisms does TCP use to manage congestion?
●​ a) Adjusting the time-to-live (TTL) of packets
●​ b) Reducing the window size based on the round-trip time
●​ c) Using the sliding window and slow start phases
●​ d) Increasing the number of retransmission attempts​
Answer: c) Using the sliding window and slow start phases
94.​Which of the following states is TCP in after a connection is successfully
established and data transmission can begin?
●​ a) TIME_WAIT
●​ b) SYN_SENT
●​ c) ESTABLISHED
●​ d) FIN_WAIT_1​
Answer: c) ESTABLISHED
95.​What is the maximum segment size (MSS) in TCP typically limited by?
●​ a) The buffer size of the sender
●​ b) The network path's maximum transmission unit (MTU)
●​ c) The TCP header size
●​ d) The speed of the sender’s connection​
Answer: b) The network path's maximum transmission unit (MTU)
96.​How does TCP ensure that data is received without errors?
●​ a) By using checksums and acknowledgment messages
●​ b) By retransmitting data until the receiver confirms receipt
●​ c) By using encryption for secure transmission
●​ d) By segmenting data into smaller pieces​
Answer: a) By using checksums and acknowledgment messages
97.​What is the role of the "URG" (Urgent) flag in TCP?
●​ a) To indicate that the data in the segment is urgent and should be processed
immediately
●​ b) To mark the beginning of a new data transfer session
●​ c) To indicate the end of the transmission
●​ d) To force the connection to be closed​
Answer: a) To indicate that the data in the segment is urgent and should be processed
immediately
98.​In TCP, which of the following happens after the termination of a connection?
●​ a) The sender continues sending data until the receiver acknowledges
●​ b) The connection is left in a TIME_WAIT state to ensure all segments are received
●​ c) The receiver is forced to acknowledge the last segment before closing
●​ d) The receiver automatically resets the connection​
Answer: b) The connection is left in a TIME_WAIT state to ensure all segments are
received
99.​Which TCP flag is used to indicate that the receiver is ready to accept data?
●​ a) SYN
●​ b) ACK
●​ c) RST
●​ d) FIN​
Answer: b) ACK
100.​ Which of the following is true about the relationship between TCP and UDP?
●​ a) TCP provides reliable data delivery while UDP does not
●​ b) UDP guarantees packet delivery, whereas TCP does not
●​ c) TCP is connectionless, and UDP is connection-oriented
●​ d) Both TCP and UDP are used interchangeably without differences in their functionality​
Answer: a) TCP provides reliable data delivery while UDP does not

IP address
1.​ What does IP stand for?​

●​ a) Internet Protocol
●​ b) Internet Process
●​ c) Internal Protocol
●​ d) Internet Program​
Answer: a) Internet Protocol

2.Which layer of the OSI model does the IP protocol operate at?​

●​ a) Transport
●​ b) Network
●​ c) Data Link
●​ d) Application​
Answer: b) Network

3.How many bits are there in an IPv4 address?​

●​ a) 32 bits
●​ b) 64 bits
●​ c) 128 bits
●​ d) 256 bits​
Answer: a) 32 bits

4.Which of the following is a valid IPv4 address?​

●​ a) 192.168.1.1
●​ b) 255.256.1.1
●​ c) 300.1.1.1
●​ d) 192.168.0.999​
Answer: a) 192.168.1.1

5.What is the total number of possible IP addresses in IPv4?​

●​ a) 2^32
●​ b) 2^16
●​ c) 2^128
●​ d) 2^64​
Answer: a) 2^32

What is an IPv4 subnet mask used for?​

●​ a) To identify the network part of an IP address


●​ b) To encrypt data
●​ c) To identify the host part of an IP address
●​ d) To provide security for a network​
Answer: a) To identify the network part of an IP address

Which IP class is used for large networks?​

●​ a) Class A
●​ b) Class B
●​ c) Class C
●​ d) Class D​
Answer: a) Class A

What is the default subnet mask for a Class A IP address?​

●​ a) 255.255.0.0
●​ b) 255.0.0.0
●​ c) 255.255.255.0
●​ d) 255.255.255.255​
Answer: b) 255.0.0.0

What does the term "private IP address" mean?​

●​ a) An IP address that can only be used within a local network


●​ b) An IP address that is used for secure communications
●​ c) An IP address that is not routed on the public internet
●​ d) Both a and c​
Answer: d) Both a and c

Which IP address range is used for private networks in IPv4?​

●​ a) 10.0.0.0 – 10.255.255.255
●​ b) 172.16.0.0 – 172.31.255.255
●​ c) 192.168.0.0 – 192.168.255.255
●​ d) All of the above​
Answer: d) All of the above

Which of the following is the loopback IP address in IPv4?​

●​ a) 127.0.0.1
●​ b) 0.0.0.0
●​ c) 255.255.255.255
●​ d) 192.168.1.1​
Answer: a) 127.0.0.1

What is the purpose of the loopback address (127.0.0.1)?​

●​ a) To test the local network connection


●​ b) To test the network card in a computer
●​ c) To verify the proper configuration of a router
●​ d) All of the above​
Answer: d) All of the above

What is the IP address range for a Class B network?​

●​ a) 128.0.0.0 – 191.255.255.255
●​ b) 0.0.0.0 – 127.255.255.255
●​ c) 192.0.0.0 – 223.255.255.255
●​ d) 224.0.0.0 – 255.255.255.255​
Answer: a) 128.0.0.0 – 191.255.255.255

What does CIDR stand for in IP addressing?​

●​ a) Classless Inter-Domain Routing


●​ b) Class Interval Domain Routing
●​ c) Class Inter-Domain Routing
●​ d) Classless Internet Data Routing​
Answer: a) Classless Inter-Domain Routing

In CIDR notation, what does the "/24" mean in the IP address 192.168.1.0/24?​

●​ a) 24 bits for the network part, and 8 bits for the host part
●​ b) 8 bits for the network part, and 24 bits for the host part
●​ c) It is the subnet mask
●​ d) Both a and c​
Answer: d) Both a and c

What is the broadcast address for the network 192.168.1.0/24?​

●​ a) 192.168.1.255
●​ b) 192.168.1.0
●​ c) 255.255.255.255
●​ d) 192.168.1.1​
Answer: a) 192.168.1.255

Which of the following IP addresses is a reserved IP address?​

●​ a) 192.168.5.255
●​ b) 10.255.255.255
●​ c) 255.255.255.255
●​ d) 172.16.1.1​
Answer: c) 255.255.255.255

Which of the following is an example of a valid public IP address?​

●​ a) 192.168.1.1
●​ b) 10.0.0.1
●​ c) 8.8.8.8
●​ d) 172.16.0.1​
Answer: c) 8.8.8.8

Which address is used by routers to communicate with each other on a network?​

●​ a) Broadcast address
●​ b) Network address
●​ c) Unicast address
●​ d) Multicast address​
Answer: b) Network address

Which of the following IP address classes has the smallest number of hosts?​

●​ a) Class A
●​ b) Class B
●​ c) Class C
●​ d) Class D​
Answer: c) Class C

What does the "subnet mask" 255.255.255.0 indicate?​

●​ a) The first 24 bits are used for the network, and the remaining 8 bits are used for hosts
●​ b) The first 8 bits are used for the network, and the remaining 24 bits are used for hosts
●​ c) The entire address is used for the network
●​ d) The address has no subnetting​
Answer: a) The first 24 bits are used for the network, and the remaining 8 bits are used
for hosts

Which address is used to send data to all hosts on a local network?​

●​ a) Unicast address
●​ b) Broadcast address
●​ c) Multicast address
●​ d) Anycast address​
Answer: b) Broadcast address

Which IP address class has a subnet mask of 255.255.255.0 by default?​

●​ a) Class A
●​ b) Class B
●​ c) Class C
●​ d) Class D​
Answer: c) Class C

How many hosts can be addressed by a Class C network with a subnet mask of
255.255.255.0?​

●​ a) 254 hosts
●​ b) 256 hosts
●​ c) 128 hosts
●​ d) 512 hosts​
Answer: a) 254 hosts

What is the primary function of a router in an IP network?​

●​ a) To assign IP addresses to hosts


●​ b) To route packets between different networks
●​ c) To encrypt data for secure transmission
●​ d) To divide a network into smaller subnets​
Answer: b) To route packets between different networks

Which IP address range is used for multicast communication in IPv4?​

●​ a) 224.0.0.0 to 239.255.255.255
●​ b) 192.168.0.0 to 192.168.255.255
●​ c) 10.0.0.0 to 10.255.255.255
●​ d) 172.16.0.0 to 172.31.255.255​
Answer: a) 224.0.0.0 to 239.255.255.255

Which of the following IP address is considered a Class A address?​

●​ a) 10.0.0.1
●​ b) 172.16.0.1
●​ c) 192.168.1.1
●​ d) 224.0.0.1​
Answer: a) 10.0.0.1

Which of the following addresses represents a reserved address in IPv4?​

●​ a) 192.168.100.1
●​ b) 255.255.255.255
●​ c) 128.0.0.1
●​ d) 0.0.0.0​
Answer: b) 255.255.255.255

What is the function of an IP address?​

●​ a) To uniquely identify a device on a network


●​ b) To provide network security
●​ c) To convert domain names into IP addresses
●​ d) To determine the bandwidth of the network​
Answer: a) To uniquely identify a device on a network

30. Which of the following is an example of an IPv6 address?​

○​ a) 192.168.1.1
○​ b) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
○​ c) 10.0.0.1
○​ d) 172.16.0.1​
Answer: b) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2.​ Which of the following is true about IPv6?
●​ a) IPv6 uses 128-bit addresses
●​ b) IPv6 is not backward compatible with IPv4
●​ c) IPv6 does not support autoconfiguration
●​ d) IPv6 addresses are written in decimal​
Answer: a) IPv6 uses 128-bit addresses
32.​What is the main benefit of IPv6 over IPv4?
●​ a) It provides faster data transmission speeds
●​ b) It offers a larger address space
●​ c) It supports more secure data encryption
●​ d) It is backward compatible with IPv4​
Answer: b) It offers a larger address space
33.​Which of the following is the size of an IPv6 address?
●​ a) 32 bits
●​ b) 64 bits
●​ c) 128 bits
●​ d) 256 bits​
Answer: c) 128 bits
34.​How many hexadecimal digits are used to represent an IPv6 address?
●​ a) 6
●​ b) 8
●​ c) 4
●​ d) 16​
Answer: b) 8
35.​What does the "::" represent in an IPv6 address?
●​ a) It is used to separate network and host portions
●​ b) It indicates the beginning of the address
●​ c) It indicates one or more groups of consecutive 16-bit zeros
●​ d) It is the address for the local loopback​
Answer: c) It indicates one or more groups of consecutive 16-bit zeros
36.​Which of the following IPv6 addresses is used for local communication within a
network?
●​ a) 2001:0db8::
●​ b) fc00::/7
●​ c) 0::/8
●​ d) fe80::/10​
Answer: d) fe80::/10
37.​Which of the following represents a valid IPv6 address?
●​ a) 192.168.1.1
●​ b) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
●​ c) 10.0.0.1
●​ d) 172.16.0.1​
Answer: b) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
38.​Which part of an IPv6 address is used for routing?
●​ a) Network prefix
●​ b) Interface identifier
●​ c) Subnet mask
●​ d) Broadcast address​
Answer: a) Network prefix
39.​What is the purpose of the Link-local address in IPv6?
●​ a) To communicate with other devices in the local network
●​ b) To provide communication between different networks
●​ c) To route traffic globally
●​ d) To assign globally unique addresses​
Answer: a) To communicate with other devices in the local network
40.​Which of the following is an example of an IPv6 loopback address?
●​ a) 0.0.0.0
●​ b) ::1
●​ c) 127.0.0.1
●​ d) 192.168.1.1​
Answer: b) ::1
41.​Which of the following is the primary reason for the transition from IPv4 to IPv6?
●​ a) IPv4 address depletion
●​ b) IPv6 is faster than IPv4
●​ c) IPv6 supports more security features
●​ d) IPv6 is easier to configure​
Answer: a) IPv4 address depletion
42.​Which of the following is a key feature of IPv6?
●​ a) NAT (Network Address Translation)
●​ b) Simplified header format
●​ c) IPv6 addresses are backward compatible with IPv4
●​ d) IPv6 uses less bandwidth than IPv4​
Answer: b) Simplified header format
43.​Which of the following is NOT a reserved IP address range?
●​ a) 0.0.0.0 - 0.255.255.255
●​ b) 127.0.0.0 - 127.255.255.255
●​ c) 169.254.0.0 - 169.254.255.255
●​ d) 192.168.1.0 - 192.168.255.255​
Answer: d) 192.168.1.0 - 192.168.255.255
44.​What is the primary purpose of NAT (Network Address Translation)?
●​ a) To provide encryption for data transmission
●​ b) To translate between private and public IP addresses
●​ c) To assign static IP addresses to all devices
●​ d) To assign IP addresses to devices dynamically​
Answer: b) To translate between private and public IP addresses
45.​Which of the following is true about the IPv4 address 0.0.0.0?
●​ a) It is used to represent the local loopback
●​ b) It is the network address for the default route
●​ c) It is a reserved address for broadcasting
●​ d) It is used to identify any host within a network​
Answer: b) It is the network address for the default route
46.​In an IPv4 address, what is the range of the first octet for a Class B network?
●​ a) 128-191
●​ b) 1-127
●​ c) 192-223
●​ d) 224-255​
Answer: a) 128-191
47.​What is the main purpose of a subnet mask?
●​ a) To encrypt IP address information
●​ b) To identify the network and host portions of an IP address
●​ c) To provide secure data transmission
●​ d) To specify the maximum number of hops allowed in a network​
Answer: b) To identify the network and host portions of an IP address
48.​Which of the following IP address ranges is used for Class C addresses?
●​ a) 128.0.0.0 - 191.255.255.255
●​ b) 192.0.0.0 - 223.255.255.255
●​ c) 0.0.0.0 - 127.255.255.255
●​ d) 224.0.0.0 - 255.255.255.255​
Answer: b) 192.0.0.0 - 223.255.255.255
49.​What is the purpose of the IPv4 address 255.255.255.255?
●​ a) To broadcast a packet to all devices in the local network
●​ b) To assign a unique address to each device
●​ c) To assign a private address for NAT purposes
●​ d) To route packets globally​
Answer: a) To broadcast a packet to all devices in the local network
50.​What is the first step when configuring a device to use an IP address?
●​ a) Assigning a subnet mask
●​ b) Configuring DNS settings
●​ c) Assigning an IP address
●​ d) Setting up a gateway address​
Answer: c) Assigning an IP address
51.​Which type of address is used to identify a device in a large network and is
globally routable?
●​ a) Private IP address
●​ b) Local IP address
●​ c) Public IP address
●​ d) Loopback address​
Answer: c) Public IP address
52.​Which of the following is used to identify a subnet in IPv4?
●​ a) Subnet mask
●​ b) Default gateway
●​ c) Domain name
●​ d) Host ID​
Answer: a) Subnet mask
53.​Which of the following IP address ranges is used for private addresses in IPv6?
●​ a) 10.0.0.0 - 10.255.255.255
●​ b) fc00::/7
●​ c) 172.16.0.0 - 172.31.255.255
●​ d) 192.168.0.0 - 192.168.255.255​
Answer: b) fc00::/7
54.​Which of the following IP addresses is used to identify the local loopback in IPv4?
●​ a) 192.168.1.1
●​ b) 127.0.0.1
●​ c) 0.0.0.0
●​ d) 255.255.255.255​
Answer: b) 127.0.0.1
55.​Which of the following is true about IPv6 addresses?
●​ a) They are written in hexadecimal notation
●​ b) They can be written in dotted-decimal notation
●​ c) They are backward compatible with IPv4
●​ d) They are 64-bit long​
Answer: a) They are written in hexadecimal notation
56.​How many bits are used to identify the host in a Class A IPv4 address?
●​ a) 8 bits
●​ b) 16 bits
●​ c) 24 bits
●​ d) 32 bits​
Answer: c) 24 bits
57.​Which address is used to send data to multiple destinations in a network in IPv4?
●​ a) Unicast
●​ b) Broadcast
●​ c) Multicast
●​ d) Anycast​
Answer: c) Multicast
58.​What is the subnet mask for the Class A address range?
●​ a) 255.0.0.0
●​ b) 255.255.0.0
●​ c) 255.255.255.0
●​ d) 255.255.255.255​
Answer: a) 255.0.0.0
59.​Which IPv6 address is used for communication within a single network segment?
●​ a) Link-local address
●​ b) Global address
●​ c) Multicast address
●​ d) Anycast address​
Answer: a) Link-local address
60.​What is the range of IPv4 addresses in a Class A network?
●​ a) 1.0.0.0 to 126.0.0.0
●​ b) 128.0.0.0 to 191.255.255.255
●​ c) 192.0.0.0 to 223.255.255.255
●​ d) 224.0.0.0 to 239.255.255.255​
Answer: a) 1.0.0.0 to 126.0.0.0
61.​What is the purpose of a default gateway in an IP network?
●​ a) To assign IP addresses dynamically
●​ b) To route packets between different networks
●​ c) To encrypt data
●​ d) To monitor network performance​
Answer: b) To route packets between different networks
62.​In an IPv4 network, how many bits are used for the network portion in a Class C IP
address?
●​ a) 24 bits
●​ b) 16 bits
●​ c) 8 bits
●​ d) 32 bits​
Answer: a) 24 bits
63.​What is the maximum number of hosts that can be addressed in a Class C
network?
●​ a) 254 hosts
●​ b) 128 hosts
●​ c) 256 hosts
●​ d) 512 hosts​
Answer: a) 254 hosts
64.​Which type of address in IPv6 is used for routing data to the nearest group of
destinations?
●​ a) Unicast
●​ b) Multicast
●​ c) Anycast
●​ d) Broadcast​
Answer: c) Anycast
65.​What is the primary purpose of the ARP (Address Resolution Protocol)?
●​ a) To resolve domain names to IP addresses
●​ b) To map MAC addresses to IP addresses
●​ c) To route packets between different networks
●​ d) To assign IP addresses to hosts dynamically​
Answer: b) To map MAC addresses to IP addresses
66.​What is the default subnet mask for a Class B IP address?
●​ a) 255.255.255.0
●​ b) 255.255.0.0
●​ c) 255.255.255.255
●​ d) 255.0.0.0​
Answer: b) 255.255.0.0
67.​What does "CIDR" stand for in the context of IP addressing?
●​ a) Classless Inter-Domain Routing
●​ b) Classful Inter-Domain Routing
●​ c) Class Inter-Domain Routing
●​ d) Classless Internet Routing​
Answer: a) Classless Inter-Domain Routing
68.​What is the purpose of an IP address?
●​ a) To identify a network device on the internet
●​ b) To provide encryption for data
●​ c) To assign a MAC address to the device
●​ d) To provide the default gateway for the device​
Answer: a) To identify a network device on the internet
69.​Which of the following is a valid IPv4 address for a Class B network?
●​ a) 172.16.0.1
●​ b) 192.168.0.1
●​ c) 10.0.0.1
●​ d) 224.0.0.1​
Answer: a) 172.16.0.1
70.​Which of the following is NOT a valid method of assigning IP addresses to
devices?
●​ a) Static IP address assignment
●​ b) Dynamic IP address assignment (DHCP)
●​ c) Manual MAC address assignment
●​ d) Link-local address assignment​
Answer: c) Manual MAC address assignment

71.​What is the default subnet mask for a Class A IP address?


●​ a) 255.255.255.0
●​ b) 255.0.0.0
●​ c) 255.255.0.0
●​ d) 255.255.255.255​
Answer: b) 255.0.0.0
72.​In an IPv4 address, how many bits are used for the host portion in a Class C
network?
●​ a) 24 bits
●​ b) 8 bits
●​ c) 16 bits
●​ d) 32 bits​
Answer: b) 8 bits
73.​What is the range of the first octet of a Class A IPv4 address?
●​ a) 0-127
●​ b) 128-191
●​ c) 192-223
●​ d) 224-255​
Answer: a) 0-127
74.​Which of the following is used to divide a large network into smaller subnets?
●​ a) Subnet mask
●​ b) Default gateway
●​ c) DHCP
●​ d) Router​
Answer: a) Subnet mask
75.​What is the valid range for an IPv4 Class B address?
●​ a) 128.0.0.0 - 191.255.255.255
●​ b) 192.0.0.0 - 223.255.255.255
●​ c) 0.0.0.0 - 127.255.255.255
●​ d) 224.0.0.0 - 239.255.255.255​
Answer: a) 128.0.0.0 - 191.255.255.255
76.​Which of the following is used for automatic IP address assignment in a network?
●​ a) ARP
●​ b) DNS
●​ c) DHCP
●​ d) ICMP​
Answer: c) DHCP
77.​What is the default subnet mask for a Class C address?
●​ a) 255.255.255.0
●​ b) 255.255.0.0
●​ c) 255.255.255.255
●​ d) 255.0.0.0​
Answer: a) 255.255.255.0
78.​Which of the following best describes the function of a subnet mask?
●​ a) It hides the IP address
●​ b) It identifies the network and host portions of the IP address
●​ c) It encrypts the IP address
●​ d) It defines the gateway address​
Answer: b) It identifies the network and host portions of the IP address
79.​Which of the following is NOT a valid IPv6 address format?
●​ a) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
●​ b) 2001:0db8::8a2e:0370:7334
●​ c) 192.168.1.1
●​ d) 0:0:0:0:0:0:0:1​
Answer: c) 192.168.1.1
80.​Which type of address does an IPv4 broadcast use?
●​ a) Unicast
●​ b) Broadcast
●​ c) Multicast
●​ d) Anycast​
Answer: b) Broadcast
81.​What is the main reason for using CIDR (Classless Inter-Domain Routing) in IP
addressing?
●​ a) To reduce the number of subnets needed
●​ b) To allow more flexible IP address allocation
●​ c) To increase the size of the IP address space
●​ d) To simplify IP address assignment​
Answer: b) To allow more flexible IP address allocation
82.​What is the purpose of the IPv6 global unicast address?
●​ a) To communicate with other devices in the local network
●​ b) To communicate across the internet with globally unique addresses
●​ c) To identify a specific device within a local network
●​ d) To provide privacy for network communication​
Answer: b) To communicate across the internet with globally unique addresses
83.​Which of the following IPv6 address types is used for communication with
multiple destinations?
●​ a) Unicast
●​ b) Multicast
●​ c) Anycast
●​ d) Broadcast​
Answer: b) Multicast
84.​Which of the following is a reserved IPv4 address for private networks?
●​ a) 172.16.0.0 - 172.31.255.255
●​ b) 10.0.0.0 - 10.255.255.255
●​ c) 192.168.0.0 - 192.168.255.255
●​ d) All of the above​
Answer: d) All of the above
85.​Which IPv6 address type is used to send data to one device only?
●​ a) Unicast
●​ b) Multicast
●​ c) Anycast
●​ d) Broadcast​
Answer: a) Unicast
86.​Which of the following is the primary reason for using private IP addresses in
networks?
●​ a) To save IPv4 address space
●​ b) To enable better network performance
●​ c) To prevent security breaches
●​ d) To provide faster routing​
Answer: a) To save IPv4 address space
87.​What is the role of a default gateway in a network?
●​ a) To route packets between devices on the same network
●​ b) To route packets between different networks
●​ c) To assign IP addresses dynamically
●​ d) To monitor network traffic​
Answer: b) To route packets between different networks
88.​Which of the following IP addresses is used as the default gateway in most home
networks?
●​ a) 192.168.0.1
●​ b) 127.0.0.1
●​ c) 0.0.0.0
●​ d) 10.0.0.1​
Answer: a) 192.168.0.1
89.​What is the maximum number of hosts that can be configured on a Class A
network?
●​ a) 65,536
●​ b) 16,777,216
●​ c) 2,097,152
●​ d) 256​
Answer: b) 16,777,216
90.​In an IPv6 address, how is the "::" notation used?
●​ a) To represent all bits set to 1
●​ b) To shorten a sequence of consecutive zero blocks
●​ c) To indicate an IPv6 loopback address
●​ d) To represent a multicast address​
Answer: b) To shorten a sequence of consecutive zero blocks
91.​What is the IPv4 Class D address range used for?
●​ a) Multicast addressing
●​ b) Private addressing
●​ c) Loopback addressing
●​ d) Unicast addressing​
Answer: a) Multicast addressing
92.​What is the main advantage of IPv6 over IPv4?
●​ a) Increased speed of data transfer
●​ b) Larger address space
●​ c) More secure connections
●​ d) Lower overhead​
Answer: b) Larger address space
93.​What is the main function of the Domain Name System (DNS)?
●​ a) To assign IP addresses dynamically
●​ b) To map domain names to IP addresses
●​ c) To assign IP addresses to devices
●​ d) To route packets between networks​
Answer: b) To map domain names to IP addresses
94.​What is the valid range for an IPv6 address?
●​ a) 0:0:0:0:0:0:0:0 - ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
●​ b) 0.0.0.0 to 255.255.255.255
●​ c) 10.0.0.0 to 10.255.255.255
●​ d) 192.168.0.0 to 192.168.255.255​
Answer: a) 0:0:0:0:0:0:0:0 - ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
95.​What is the IPv6 address used for the local loopback?
●​ a) 127.0.0.1
●​ b) ::1
●​ c) 2001:0db8::
●​ d) fe80::1​
Answer: b) ::1
96.​Which of the following is the primary purpose of a public IP address?
●​ a) To communicate across the internet
●​ b) To identify a specific device within a local network
●​ c) To identify devices in private networks
●​ d) To allow devices to connect to wireless networks​
Answer: a) To communicate across the internet
97.​What is the network portion of an IP address defined by?
●​ a) The subnet mask
●​ b) The default gateway
●​ c) The host portion
●​ d) The MAC address​
Answer: a) The subnet mask
98.​What type of address is the 0.0.0.0 address in IPv4?
●​ a) Broadcast address
●​ b) Default route address
●​ c) Private address
●​ d) Loopback address​
Answer: b) Default route address
99.​Which of the following IPv4 address classes is used for multicast?
●​ a) Class A
●​ b) Class B
●​ c) Class C
●​ d) Class D​
Answer: d) Class D
100.​ What is the role of an IPv4 private address?
●​ a) To provide a globally unique address
●​ b) To enable secure communication
●​ c) To be used only within private networks
●​ d) To allow public access from external networks​
Answer: c) To be used only within private networks

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy