Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

IT Networking Fundamentals Quiz Challenge

Test Your Core Network Design and Configuration Skills

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art promoting an IT Networking Fundamentals Quiz

Are you ready to master networking fundamentals and boost your IT confidence? This interactive Networking Fundamentals Quiz covers everything from OSI model layers to IP addressing in a fun, timed format. Ideal for students and professionals seeking hands-on practice on subnetting and troubleshooting, this quiz offers instant feedback and detailed explanations. Explore related challenges like the IP Networking Fundamentals Quiz or browse all quizzes to customize and enhance your learning experience. Feel free to modify any question in our editor for a personalized study plan.

Which of the following describes a ring network topology?
All devices connected to a central hub
Devices share a single coaxial cable
Each device connects directly to every other device
Devices connected in a closed loop
A ring topology features devices connected in a closed loop so each node has exactly two neighbors. Data travels in one or both directions around the ring. This structure distinguishes it from star, bus, and mesh topologies.
Which OSI layer is responsible for routing packets between different networks?
Layer 2 (Data Link)
Layer 3 (Network)
Layer 4 (Transport)
Layer 5 (Session)
The Network layer (Layer 3) determines the best path to forward packets across multiple networks. It handles logical addressing and routing functions. Other layers manage framing, end”to”end connections, or session control.
Which of these IP address ranges is designated for private networks?
192.168.0.0 - 192.168.255.255
169.254.0.0 - 169.254.255.255
224.0.0.0 - 239.255.255.255
198.51.100.0 - 198.51.100.255
The 192.168.0.0/16 range is one of the three private IPv4 ranges defined by RFC 1918. It is commonly used in home and small business networks. The other options are link-local, multicast, or reserved ranges.
Which command is commonly used to test basic network connectivity between two hosts?
netstat
ping
arp -a
nslookup
The ping command sends ICMP echo requests to a target host to verify connectivity and measure round-trip time. It is the standard tool for basic connectivity tests. Other commands inspect ports, DNS, or ARP tables.
Which device operates only at the Data Link layer to forward Ethernet frames based on MAC addresses?
Switch
Firewall
Router
Hub
A switch operates at Layer 2 (Data Link) and forwards frames by examining MAC addresses. Routers work at Layer 3, hubs at Layer 1, and firewalls often inspect higher-layer data. This makes the switch the correct layer-2 device.
Which network topology provides the highest redundancy by connecting each device directly to every other device?
Star topology
Mesh topology
Bus topology
Ring topology
In a full mesh topology, every device has a direct link to every other device, offering maximum redundancy. If one link fails, traffic can reroute via other links. This contrasts with star, bus, and ring which have single points of failure.
What is the primary function of the OSI Transport layer?
Frame delimiting and MAC addressing
Data encryption and compression
Logical path determination and routing
End-to-end reliability, flow control, and segmentation
The Transport layer (Layer 4) provides end-to-end communication services, including segmentation of data, flow control, and error recovery. It ensures reliable data transfer between hosts. Other layers handle framing, routing, or security.
For the network 192.168.1.0/28, what is the correct broadcast address?
192.168.1.255
192.168.1.14
192.168.1.16
192.168.1.15
A /28 mask (255.255.255.240) yields subnets of 16 addresses each. The first block is .0 - .15, with .15 as the broadcast address. Hosts range from .1 to .14 within that subnet.
Which protocol translates IP addresses to MAC addresses on a local network?
ARP
DHCP
ICMP
DNS
ARP (Address Resolution Protocol) maps IPv4 addresses to MAC addresses on a LAN. When a host needs the MAC for a known IP, it broadcasts an ARP request and the owner replies. DNS resolves names to IPs, not MACs.
Which device makes forwarding decisions based on IP addresses?
Hub
Router
Switch
Repeater
Routers operate at Layer 3 and forward packets based on IP address information. Switches use MAC addresses, hubs simply repeat bits, and repeaters regenerate signals without examining addresses.
Which IEEE standard defines VLAN tagging in Ethernet frames?
802.3u
802.11ac
802.1Q
802.1D
802.1Q is the IEEE standard for VLAN tagging on Ethernet networks, inserting a tag field into the frame header. 802.1D covers STP, 802.3u is Fast Ethernet, and 802.11ac is a Wi-Fi standard.
What is the purpose of a default gateway in an IP network?
To serve as an exit point for traffic leaving the local subnet
To encrypt all outbound traffic
To assign IP addresses to hosts
To resolve domain names to IP addresses
A default gateway is the router interface where packets destined for other networks are sent. It provides a route out of the local subnet. Address assignments and DNS resolution are done by other services.
Which basic network access control principle should be applied to secure network entry?
Allow all devices by default
Disable all Layer 3 protocols
Only use static routing
Authenticate and authorize devices before granting access
Network access control requires authentication and authorization of devices/users before network access is granted. This prevents unauthorized devices from connecting. Other answers do not address NAC fundamentals.
What is an advantage of using SSH over Telnet for remote management?
SSH runs on TCP port 23
SSH encrypts the data in transit
SSH supports unencrypted password authentication
SSH uses UDP for faster performance
SSH encrypts all session traffic, protecting credentials and data from eavesdropping. Telnet sends everything in plaintext, making it insecure. SSH also supports stronger authentication methods.
Which routing concept allows multiple networks to be advertised as a single summarized route?
Default routing
Route poisoning
Route summarization
Route redistribution
Route summarization aggregates contiguous network addresses into a single route advertisement, reducing routing table size and update overhead. This differs from poisoning, redistribution, or default routes.
For the IP address 172.16.45.67/21, what is the network address?
172.16.45.0
172.16.40.0
172.16.32.0
172.16.48.0
A /21 mask is 255.255.248.0, so subnets increment in 8-address blocks in the third octet. 45 falls into the 40 - 47 block, making 172.16.40.0 the correct network address. The others do not align with /21 boundaries.
What is a key benefit of dividing an OSPF domain into multiple areas?
It increases the size of the link-state database
It reduces LSA flooding and link-state database size
It provides built-in encryption for OSPF packets
It disables route summarization
Dividing an OSPF domain into areas limits the scope of link-state advertisements, reducing flooding and the size of each router's database. This improves scalability and performance. OSPF itself does not encrypt packets by default.
Which authentication protocol uses tickets issued by a Key Distribution Center (KDC)?
Kerberos
LDAP
TACACS+
RADIUS
Kerberos uses a trusted Key Distribution Center to issue time-stamped tickets for authenticating users and services. Tickets reduce password exposure and enable mutual authentication. RADIUS and TACACS+ use different mechanisms, and LDAP is a directory service.
Which protocol is widely used for establishing encrypted sessions with server authentication via digital certificates?
ICMP
FTP
SNMP
TLS
TLS (Transport Layer Security) is the standard protocol for encrypted client-server communications using X.509 certificates for server (and optionally client) authentication. FTP and SNMP lack default encryption, and ICMP is a network-layer diagnostic protocol.
In a switched network, which protocol prevents Layer 2 loops and creates a loop-free topology?
HSRP
STP
VRRP
VTP
The Spanning Tree Protocol (STP) identifies and blocks redundant switch links to prevent Layer 2 loops. HSRP and VRRP are first-hop redundancy protocols, and VTP manages VLAN configuration, not loop prevention.
0
{"name":"Which of the following describes a ring network topology?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following describes a ring network topology?, Which OSI layer is responsible for routing packets between different networks?, Which of these IP address ranges is designated for private networks?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Analyse common network topologies and architectures
  2. Identify key OSI model layers and functions
  3. Demonstrate understanding of IP addressing and subnetting
  4. Apply troubleshooting methods for network connectivity issues
  5. Evaluate switching and routing concepts in networks
  6. Master basic network security principles and protocols

Cheat Sheet

  1. Network Topologies - Dive into the world of star, bus, ring, and mesh topologies to see how each layout affects speed and reliability. A star setup makes troubleshooting a breeze but can crash if the central hub goes down, while mesh offers rock-solid uptime at the cost of complexity. Learn more
  2. OSI Model Layers - Remember the seven-layer cake of networking: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer has its role, from handling raw bits to delivering the final application data, and a catchy mnemonic makes it stick. Learn more
  3. IP Addressing Basics - Get comfortable distinguishing IPv4 from IPv6 and mastering subnet masks so you can carve networks like a pro. For instance, a 255.255.255.0 mask gives you 254 usable addresses - just enough for a busy office. Learn more
  4. Troubleshooting Methodology - Turn chaos into clarity with a step-by-step fix plan: spot the issue, form a theory, test it, take action, and verify success. Armed with ping, traceroute, and analyzers, you'll feel like a network detective chasing down clues. Learn more
  5. Switches vs Routers - Unlock the secret handshake between switches (Data Link layer) and routers (Network layer) to design efficient traffic flows. Switches keep local chatter crisp, while routers bridge different networks with smart packet forwarding. Learn more
  6. Network Security Principles - Embrace the CIA triad - Confidentiality, Integrity, Availability - to build ironclad defenses. Firewalls, intrusion detectors, and timely software updates become your trusty shields against lurking threats. Learn more
  7. Common Network Attacks - Recognize the digital baddies like DoS, Man-in-the-Middle, and phishing so you can spot their footprints faster. Monitoring traffic patterns and setting up alerts helps you nip attacks in the bud before they wreak havoc. Learn more
  8. Essential Protocols - Get cozy with TCP/IP, HTTP, and FTP, the rulebooks of data exchange on the internet. Understanding how packets are addressed, transported, and requested will supercharge your networking IQ. Learn more
  9. VLAN Concepts - Slice your network into neat Virtual LANs to boost performance and keep sensitive traffic under wraps. VLANs shrink broadcast domains and add a layer of logical security, making your digital topology much more organized. Learn more
  10. Encryption Protocols - Secure your data highways with SSL/TLS so that eavesdroppers can't snoop on sensitive info. These encryption layers lock down communication channels and are a must for safe online transactions. Learn more
Powered by: Quiz Maker