Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Computer Networking Knowledge Quiz Challenge

Test Your Networking Fundamentals and Skills

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art representing a computer networking knowledge quiz.

Ever wondered how well you understand network layers, IP addressing, and routing? This Computer Networking Knowledge Quiz presents 15 multiple-choice questions designed to test your grasp of networking fundamentals. For a deeper challenge, explore the Networking Fundamentals Quiz or feel free to modify this quiz in our editor to suit your learning style. If you're refreshing core concepts, the Basic Networking Knowledge Test provides focused practice. Discover more quizzes to refine your skills and track your progress.

Which network topology uses a central hub or switch to connect all network devices?
Star
Ring
Mesh
Bus
In a star topology, each node is connected to a central device such as a switch or hub, simplifying network management and fault isolation. Bus, ring, and mesh topologies connect devices in single cable, circular, or fully redundant patterns, respectively.
Which OSI model layer is responsible for end-to-end host communication?
Data Link
Network
Transport
Physical
The Transport layer provides end-to-end communication, flow control, and error recovery between hosts. The Physical layer handles raw bit transmission, Data Link deals with frame delivery on a link, and Network handles routing between networks.
What command tests basic IP connectivity between two hosts?
netstat
ping
nslookup
traceroute
The ping command uses ICMP echo requests to verify basic IP-level connectivity between two hosts. Traceroute maps the path, netstat shows network statistics, and nslookup queries DNS.
What IP address class has a default subnet mask of 255.0.0.0?
Class B
Class A
Class D
Class C
Class A addresses (1.0.0.0 to 127.255.255.255) use the default mask 255.0.0.0. Class B uses 255.255.0.0, Class C uses 255.255.255.0, and Class D is reserved for multicast.
Which device operates at the Data Link layer (Layer 2) of the OSI model?
Router
Gateway
Switch
Hub
A network switch forwards frames based on MAC addresses at the Data Link layer. Routers operate at Layer 3, hubs at Layer 1, and gateways perform protocol translation at higher layers.
Which protocol resolves IP addresses to MAC addresses on a local network?
DNS
DHCP
ARP
ICMP
ARP (Address Resolution Protocol) maps IP addresses to MAC addresses on a local network. DNS resolves domain names to IPs, DHCP assigns IP addresses, and ICMP handles diagnostic messages.
Which subnet mask corresponds to /24 in CIDR notation?
255.255.255.128
255.0.0.0
255.255.255.0
255.255.0.0
/24 indicates 24 bits of network prefix, which corresponds to the mask 255.255.255.0. Other masks represent different prefix lengths.
Which TCP/IP model layer corresponds to the OSI Data Link and Physical layers?
Internet
Network Access
Application
Transport
The TCP/IP Network Access layer covers the functions of the OSI Physical and Data Link layers. The Internet layer maps to the OSI Network layer, Transport to Transport, and Application to the upper layers.
What is the primary purpose of a default gateway in an IP network?
Assign IP addresses to hosts
Filter traffic between VLANs
Provide a path to remote networks
Connect wireless clients
The default gateway routes traffic destined for outside the local subnet to remote networks. IP assignment is handled by DHCP servers, VLAN filtering by switches, and wireless connections by access points.
Which VLAN configuration allows multiple VLANs across a single link between switches?
Native
Trunk
Access
Hybrid
A trunk port carries traffic for multiple VLANs by tagging frames to distinguish VLAN membership. Access ports carry traffic for a single VLAN, while native refers to untagged frames on a trunk.
Which command displays the routing table on a Linux system?
netstat -rn
route print
ipconfig
traceroute
The 'netstat -rn' command shows the kernel IP routing table in numeric form on Linux. 'route print' is used on Windows, 'ipconfig' shows IP configurations, and 'traceroute' maps network paths.
Which protocol uses UDP port 53?
HTTP
SSH
DNS
FTP
DNS typically uses UDP port 53 for name resolution queries. HTTP uses TCP port 80, FTP uses ports 20/21, and SSH uses TCP port 22.
When pinging a host results in 'Destination Host Unreachable', what is a likely cause?
Expired DHCP lease
DNS misconfiguration
Incorrect default gateway
Blocked TCP port
The 'Destination Host Unreachable' message usually indicates no valid route to the destination, often due to an incorrect default gateway. DNS, TCP ports, and DHCP leases do not directly affect basic IP routing.
Which wireless security standard is considered most secure for home networks?
WPA2
WPS
WEP
WPA
WPA2 uses strong AES encryption and is widely considered secure for home use. WEP is outdated and vulnerable, WPA is weaker, and WPS has known vulnerabilities.
A switch learns MAC addresses to populate which table?
Routing table
FIB table
ARP table
CAM table
Switches use the CAM (Content Addressable Memory) table to map MAC addresses to specific ports for frame forwarding. ARP tables map IP to MAC, routing tables direct IP traffic, and FIB tables are used in routers.
How many usable host addresses are available in a /28 IPv4 subnet?
16
12
30
14
A /28 subnet provides 16 total IP addresses, of which 2 are reserved for network and broadcast, leaving 14 usable host addresses. Other options miscalculate the reserved addresses or host bits.
Which IEEE standard defines the Rapid Spanning Tree Protocol (RSTP)?
802.1w
802.3ad
802.1D
802.11w
IEEE 802.1w specifies the Rapid Spanning Tree Protocol, which offers faster convergence than the original 802.1D STP. 802.3ad covers link aggregation and 802.11w covers wireless management frame protection.
In an access control list (ACL), what happens to packets that do not match any entry?
They are logged automatically
They are implicitly denied
They are forwarded without inspection
They are flagged for review
ACLs include an implicit deny all rule at the end, so any packet not explicitly permitted is dropped. They are neither forwarded nor automatically logged without additional configuration.
Given IP address 10.1.1.100 with subnet mask 255.255.255.192 (/26), what is the broadcast address for this subnet?
10.1.1.191
10.1.1.127
10.1.1.63
10.1.1.255
A /26 mask divides the network into subnets of 64 addresses; the interval containing 10.1.1.100 ranges from .64 to .127, making .127 the broadcast address. Other values fall into different subnets.
In OSPF, which router type is responsible for redistributing external routes into the OSPF domain?
DR
BDR
ASBR
ABR
An Autonomous System Boundary Router (ASBR) injects external routes from other protocols or static configurations into the OSPF domain. ABRs connect areas, DRs manage multiaccess segments, and BDRs serve as backups.
0
{"name":"Which network topology uses a central hub or switch to connect all network devices?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which network topology uses a central hub or switch to connect all network devices?, Which OSI model layer is responsible for end-to-end host communication?, What command tests basic IP connectivity between two hosts?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Analyze network topologies and communication protocols
  2. Identify IP addressing schemes and subnet configurations
  3. Demonstrate understanding of OSI and TCP/IP models
  4. Apply troubleshooting techniques to diagnose connectivity issues
  5. Evaluate security measures for network protection
  6. Master basic router and switch configuration

Cheat Sheet

  1. Understand Network Topologies - Picture your network like a city map: star, bus, ring, and mesh layouts each have their own flavor of traffic flow, pros, and quirks. Knowing which layout suits your needs helps you avoid congestion jams and single points of failure. Dive in and start mapping your perfect network maze! en.wikipedia.org
  2. Grasp Communication Protocols - Think of TCP/IP, UDP, and HTTP as the languages your network devices speak to swap data without a hiccup. Mastering these "languages" ensures your packets arrive safe and sound, whether you're streaming your favorite show or sending an important email. It's like learning secret handshakes that keep your digital world connected! en.wikipedia.org
  3. Master IP Addressing and Subnetting - IP addresses are like home addresses for devices on the internet, and subnet masks tell you which neighborhood they belong to. Understanding how to carve up your network into neat, manageable subnets makes routing a breeze and troubleshooting a snap. Before you know it, you'll be assigning addresses like a postal service pro! en.wikipedia.org
  4. Study the OSI and TCP/IP Models - Imagine building a sandwich: each layer (physical, data link, network, transport, etc.) adds flavor and function to your data journey. By studying these models, you'll know exactly where to inspect or "add mayo" when things go wrong. It's the recipe book for understanding every byte's adventure! en.wikipedia.org
  5. Learn Troubleshooting Techniques - When your network hiccups, tools like ping, traceroute, and packet sniffers are your digital stethoscopes and MRIs. Practice diagnosing and fixing gremlins in the system, and you'll build confidence to tackle real-world outages. Turn those red warning lights into green checkmarks! en.wikipedia.org
  6. Evaluate Network Security Measures - From malware to DDoS dragons, threats lurk around every digital corner. Learn how firewalls, encryption, and intrusion detection systems act as knights in shining armor to protect your fortress. A solid security plan is your best weapon against cyber-villains! arxiv.org
  7. Configure Routers and Switches - Routers are traffic directors, switches are intersection managers - getting hands-on with these devices sharpens your network ninja skills. Proper setup and fine-tuning maximize speed and reliability, keeping data flowing smoothly. Roll up your sleeves and start typing those configs! en.wikipedia.org
  8. Understand Wireless Networking - In a world gone mobile, Wi-Fi rules the roost. Explore standards like 802.11ac/ax, security protocols such as WPA3, and best practices for signal coverage. Soon you'll be the guru of seamless roaming and robust wireless links! en.wikipedia.org
  9. Explore Network Virtualization - Virtual networks and SDN are like building with digital Legos - snap together virtual switches, routers, and firewalls on demand. These technologies boost flexibility, scalability, and efficiency in cloud environments. Jump in and start stacking those virtual blocks! en.wikipedia.org
  10. Stay Updated on Emerging Technologies - The networking world never stands still: IPv6, IoT, edge computing, and beyond are the next frontiers. Keeping your finger on the pulse ensures you're always ready for tomorrow's challenges. Hop on the innovation train and enjoy the ride! en.wikipedia.org
Powered by: Quiz Maker