Get All Modules The Bits and Bytes of Computer Networking Graded Quiz Answers
Table of Contents
Q1. A Cyclical Redundancy Check (CRC) is an example of what type of built-in protocol mechanism?
Answer: Error detection
Explanation: CRC is used to detect errors in data transmission, ensuring that data has not been corrupted during transfer.
Q2. The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? (Choose all that apply)
Answer:
Destination network unreachable
Destination unreachable
Time exceeded
Explanation:
ICMP message types include “Destination unreachable” and “Time exceeded,” which help manage network communication errors and timeouts.
Q3. The Linux and macOS program traceroute is known by a slightly different name on Windows. It’s referred to as ______.
Answer: tracert
Explanation: On Windows systems, the traceroute command is called “tracert” rather than “traceroute” as in Linux and macOS.
Q4. When issuing the Netcat command, which flags will tell you if a connection to the porting question is possible or not?
Answer: -z and -v flags
Explanation: The -z
flag tells Netcat to scan without sending data, while the -v
flag enables verbose mode, providing information about the connection status.
Q5. You need to find the Internet Protocol (IP) address for a website. Which command do you use on a Windows system?
Answer: Nslookup
Explanation: The nslookup
command is used to query DNS to find the IP address associated with a domain name on Windows systems.
Q6. Most public Domain Name Servers (DNS) are available globally through which technology?
Answer: Anycast
Explanation: Anycast is a networking method used by DNS servers to provide service from the nearest available server globally.
Q7. With virtualization, a single physical machine, called a host, can run many individual virtual instances, called ______.
Answer: Guests
Explanation: In virtualization, individual virtual machines are called “guests,” and they run on a host system.
Q8. What is the IPv6 loopback address?
Answer: 0000:0000:0000:0000:0000:0000:0000:0001
Explanation: The IPv6 loopback address is ::1
, which is written in its full form as 0000:0000:0000:0000:0000:0000:0000:0001
. This address is used to refer to the local machine.
Q9. Compress the following IP address: 9930:cafa:0000:0052:04cc:7b7a:0037:27e6.
Answer: 9930:cafa:0:052:4cc:7b7a:037:27e6
Explanation: IPv6 compression removes leading zeros in each section, so 0000
becomes 0
and 0052
becomes 52
, resulting in the compressed address.
Q10. Which Internet Protocol (IP) v6 field is identical in purpose to the TTL field in an IPv4 header?
Answer: Hop Limit
Explanation: The “Hop Limit” field in IPv6 serves the same purpose as the TTL (Time to Live) field in IPv4, which limits the number of hops a packet can make before being discarded.
Get All Module The Bits and Bytes of Computer Networking Practice Quiz Answers >>
Module 01 Challenge: Networking Basics Quiz Answers
Module 02 Challenge: The Network Layer Quiz Answers
Module 03 Challenge: The Five-Layer Network Model Quiz Answers
Module 04 Challenge: Networking Services Quiz Answers
Module 05 Challenge: Limitations of the Internet Quiz Answers
Module 06 Challenge: Troubleshooting and the Future of Networking Quiz Answers