Test on computer network with answer P7

Computer network is a group of computers and peripheral devices connected together through transmission media such as twisted cable, optical cable, electromagnetic wave, infrared ray ... to share data with each other. If you are a lover of this topic, please read your knowledge through the multiple choice questions below with the Network Administrator.
  1. Question 1. The Subnet address of an IP is from the 17th to the 23rd bit. What is its IP address:
    1. Class A
    2. Class B
    3. Class C
    4. Class D
  2. Question 2. Which of the following Subnet Mask is valid:
      1. 0.255.255.255
    1. 0.0.0.255

    2. 255.0.0.255

    3. 255.255.255.0
  3. Question 3. In the IP address, there are 5 classes A, B, C, D, E. Class B is the class with the address range:
      1. 3.192.0.0.0 to 223.255.255.255
    1. 240.0.0.0 to 255.255.255.255
    2. 128.0.0.0 to 191.255.255.255
    3. 224.0.0.0 to 239.255.255.255
  4. Question 4. In the IP address, there are 5 all classes: A, B, C, D, E. Class C is the class with the address range:
    1. 224.0.0.0 to 239.255.255.255
    2. 192.0.0.0 to 223.255.255.255
    3. 128.0.0.0 to 191.255.255.255

    4. 240.0.0.0 to 255.255.255.255

  5. Question 5. Class C is allowed to borrow up to how many bits for Subnet:
    1. 2
    2. 4
    3. 6
    4. 8
  6. Sentence 6. The first byte of an IP address looks like: 00000010. So which class does it belong to:
    1. Class A
    2. Class B
    3. Class C
    4. Class D
  7. Question 7. A class C network needs to split into 9 subnets using the following Subnet Mask:
      1. 255.255.224
    1. 255.0.0.255

    2. 255.224.255.0

    3. 255.255.255.240 (240 = 111100002)

  8. Question 8. Which of the following commands is used to add a link in the routing table to the Windows operating system:
      1. Nslookup
      1. Route
      1. Ipconfig
      1. Tracert
  9. Sentence 9. The second layer in the OSI model separates the bit stream from the Physical Layer into:
      1. Segment
      1. Frame
    1. Packet
    2. PSU
  10. Question 10. Which method is used to prevent unauthorized access (according to the predetermined access list) and can filter out packets:
      1. Encryption
      1. PhysicalProtection
      1. Firewall
      1. Login / password
4 ★ | 2 Vote