The Bits and Bytes of Computer Networking Coursera Quiz Answers

All Weeks The Bits and Bytes of Computer Networking Coursera Quiz Answers

Week 1: Introduction To Networking Quiz Answers

Q1. How many octets are there in a MAC address?

  • 5
  • 8
  • 4
  • 6

Q2. What address is used for Ethernet broadcasts?

  • 00:00:00:00:00:00
  • 11:11:11:11:11:11
  • FF:FF:FF:FF:FF:FF
  • FF:00:FF:00:FF:00

Q3. What is a cyclical redundancy check?

  • A technique that allows for multiple logical LANs to operate on the same equipment
  • The actual data being transported by an Ethernet frame
  • A way for two computers to synchronize their clocks
  • A mathematical calculation used to ensure that all data arrived intact

Quiz 02: Networking Devices

Q1. Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply.

  • A hub is a physical layer device, and a switch is a data link layer device.
  • A hub causes larger collision domains.
  • A switch remembers which devices are connected on each interface, while a hub does not.
  • Hubs are more sophisticated versions of switches.

Q2. What does LAN stand for?

  • Locally available network
  • Local area network
  • Little area network
  • Large area network

Q3. What’s a router?

  • A network device used specially for fiber cables
  • A more advanced version of a switch
  • A device that knows how to forward data between independent networks
  • A physical layer device that prevents crosstalk

Quiz 03: TCP/IP

Q1. Which of the following is an example of a network layer (layer 3) protocol?

  • Ethernet
  • IP
  • UDP
  • TCP

Q2. What’s the difference between a client and a server?

  • Clients and servers are different names for the same thing.
  • A server requests data, and a client responds to that request.
  • Clients operate on the data link layer, and servers operate on the network layer.
  • A client requests data, and a server responds to that request.

Q3. Which of the following are examples of layers of our five-layer network model? Check all that apply.

  • The physical layer
  • The application layer
  • The presentation layer
  • The transport layer

Q1. How many octets are there in a MAC address?

  • 5
  • 8
  • 4
  • 6

Q2. What address is used for Ethernet broadcasts?

  • 00:00:00:00:00:00
  • 11:11:11:11:11:11
  • FF:FF:FF:FF:FF:FF
  • FF:00:FF:00:FF:00

Q3. What is a cyclical redundancy check?

  • A technique that allows for multiple logical LANs to operate on the same equipment
  • The actual data being transported by an Ethernet frame
  • A way for two computers to synchronize their clocks
  • A mathematical calculation used to ensure that all data arrived intact

Quiz 05: The Physical Layer

Q1. What is the type of modulation used by twisted pair cable computer networks known as?

  • Line crimping
  • Simplex communication
  • Line coding
  • RJ45

Q2. What’s the difference between full and half duplex?

  • Full duplex is slower than half duplex.
  • Full duplex allows communications in two directions at the same time; half duplex means that only one side can communicate at a time.
  • Full duplex is a form of simplex communications.
  • Half duplex occurs when hubs are in use; full duplex occurs when switches are in use.

Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 02 Quiz Answers

Quiz 01: Routing

Q1. Select examples of routing protocols. Check all that apply.

  • Border Gateway Protocol
  • Routing Information Protocol
  • Transmission Control Protocol
  • Hypertext Transfer Protocol
  • User Datagram Protocol

Q2. Who is permitted to use non-routable address space?

  • Anyone
  • The IANA
  • It’s for testing purposes only
  • The IETF

Q3. A typical routing table may contain which of the following? Check all that apply.

  • Destination address
  • Total hops
  • Destination network
  • TTL

Quiz 02: Subnetting

Q1. What does CIDR stand for?

  • Classless Internet Destination Routing
  • Classfull Inter-Destination Routing
  • Classless Inter-Domain Routing
  • Classfull Identification Routing

Q2. Which of the following is a correct form of CIDR notation?

  • 192.168.1.0:24
  • 192.168.1.0/24
  • 192.168.1.0\24
  • 192.168.1.0 + 255.255.255.0

Q3. How many octets does a subnet mask have?

  • 1
  • 2
  • 3
  • 4

Quiz 03: The Network Layer

Q1. Please select all of the valid IP addresses. Check all that apply.

  • 123.456.123.456
  • 192.168.1.1
  • 8.8.8.8
  • 257.70.312.49

Q2. What happens to the TTL field of an IP datagram every time it reaches a router?

  • The TTL field is decremented by one.
  • The TTL field is reset to zero.
  • The TTL field is used for a cyclical redundancy check.
  • The TTL field is incremented by one.

Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 03 Quiz Answers

Quiz 01: The Application Layer

Q1. Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below.

  • The interconnection layer
  • The encryption layer
  • The presentation layer
  • The session layer
  • The compression layer

Q2. An example of something that operates at the application layer is:

  • A router
  • TCP
  • A web browser
  • UDP

Q3. What’s the standard number for a TTL field?

8
16
32
64

Quiz 02: The Transport Layer

Q1. What ordering of TCP flags makes up the Three-way Handshake?

  • FIN, FIN/ACK, ACK
  • SYN, SYN/ACK, ACK
  • SYN, ACK, SYN, ACK
  • SYN, ACK, FIN

Q2. Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field?

  • 4 bits
  • 8 bits
  • 16 bits
  • 32 bits

Q3. Please select all valid TCP control flags.

  • WAIT
  • LISTEN
  • CLOSE
  • ACK
  • RST
  • URG

Q4. A device that blocks traffic that meets certain criteria is known as a __.

  • Firewall
  • Router
  • Switch
  • Hub

Peer Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 04 Quiz Answers

Quiz 01: Dynamic Host Configuration Protocol

Q1. What are the four things that all computers need configured in order to operate on a modern network? Check all that apply.

  • An NTP server
  • A TCP port
  • A name server
  • An IP address
  • A default gateway
  • A subnet mask
  • A MAC address

Q2. When using Fixed Allocation DHCP, what’s used to determine a computer’s IP?

  • A record
  • Location
  • A MAC address
  • A subnet mask

Q3. The process by which a client configured to use DHCP attempts to get network configuration information is known as _____.

  • DHCP Discovery
  • DHCP Request
  • DHCP Offer
  • DHCP Acknowledgement

Quiz 02: Name Resolution in Practice

Q1. An A Record contains what?

  • A CNAME
  • An IPv4 address
  • An IPv6 address
  • A fully qualified domain name

Q2. Select all that are true.

  • One domain name can point to one IP.
  • One domain name can point to many IPs.
  • Many domain names can point to the same IP.

Q3. MX stands for __.

  • Micro extreme
  • Micro exchange
  • Mail exchange
  • Meta exchange

Q4. A fully qualified domain name can contain how many characters?

  • 63
  • 64
  • 127
  • 255

Quiz 03: Name Resolution

Q1. What transport layer protocol does DNS normally use?

  • TCP
  • IP
  • ICMP
  • UDP

Q2. A DNS TTL determines what?

  • How many steps there are in the resolution process
  • How far away a DNS can be from you
  • How many DNS resolutions can take place before the IP has to change
  • How long a DNS entry is allowed to be cached

Q3. How many root servers are there?

  • 8
  • 13
  • 16
  • 17

Quiz 04:Network Address Translation

Q1. NAT addresses concerns over the dwindling IPv4 address space by _______.

  • allowing networks to use fewer IP addresses overall.
  • allowing users to move to IPv6 when they want.
  • allowing computers using non-routable address space to communicate with the Internet.
  • performing IP masquerading.

Q2. What technique allows for inbound traffic through a NAT?

  • Port preservation
  • Port forwarding
  • Port authority
  • Ephemeral ports

Q3. The total number of IPv4 addresses is approximately:

  • 4.2 million
  • 4.2 billion
  • 4.2 trillion
  • Uncountable

Quiz 05: VPNs & Proxies

Q1. Two-factor authentication is_________________________.

  • a method where you need two passwords.
  • a method that requires two usernames.
  • a method where you authenticate twice.
  • a method where you need more than a username and a password.

Q2. VPNs are known as a _ protocol.

  • connectionless
  • data link layer
  • tunneling
  • network layer

Q3. A proxy is something that ___________.

  • sends data across a single network segment.
  • communicates on behalf of something else.
  • encrypts traffic sent across the Internet.
  • allows for many devices to speak to one other device.

Peer Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 05 Quiz Answers

Quiz 01: Broadband Internet

Q1. T1 is short for __.

  • Transportation System 1.
  • Transmission System 1.
  • Transportation 1.
  • Transmission 1.

Q2. How fast is a T1 line?

  • 1.544 Mb/sec
  • 44.763 Mb/sec
  • 1 Mb/sec
  • 128 Mb/sec

Q3. Select all statements that are true of cable internet connections.

  • They’re broadband connections.
  • They’re dial-up connections.
  • They’re shared bandwidth connections.
  • They’re wireless connections.

Quiz 02:POTS and Dial-up

Q1. Another term for POTS, or the Plain Old Telephone System, is ___.

  • Public Switched Telephone Network.
  • Phone Switched Transport Network.
  • Public Switched Telephone Exchange.
  • Public Available Telephone Network.
  • Public Available Telephone Exchange.

Q2. A baud rate is a measurement of the number of __________.

  • data segments that can be sent across a telephone line every second.
  • bits that can be sent across a telephone line every second.
  • bytes that can be sent across a telephone line every second.
  • packets that can be sent across a telephone line every second.

Quiz 03: WANs

Q1. WAN stands for __.

  • Wide Area Network.
  • Wired Area Network.
  • Wireless Area Network.
  • Wireless Local Area Network.

Q2. In a WAN, the area between a demarcation point and the ISP’s core network is known as _.

  • an access point
  • a local loop
  • a Local Area Network
  • a local link

Q3. A point-to-point VPN is also known as a __.

  • site-to-site VPN
  • one-to-many VPN
  • port forwarding VPN
  • data link VPN

Quiz 04: Wireless Networking

Q1. How many address fields does an 802.11 header have?

  • 1
  • 2
  • 3
  • 4

Q2. A wireless channel is __.

  • a portion of a frequency band.
  • a point-to-point wireless connection.
  • a collision domain.
  • an example of an ad-hoc network

Q3. Choose all of the frequencies that wireless networks typically operate on.

  • 88Mhz
  • 1.544Ghz
  • 2.4Ghz
  • 5Ghz

Peer Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 06 Quiz Answers

Quiz 01: Digging into DNS

Q1. One of Level 3’s public DNS servers is __.

  • 4.2.2.3
  • 8.8.8.8
  • 127.0.0.1
  • 192.168.1.1

Q2. A DNS resolver tool available on all major desktop operating systems is __.

  • host
  • tracert
  • ping
  • nslookup

Q3. The organization responsible for DNS at a global level is __.

  • Google
  • RFC
  • ICANN
  • IANA

Quiz 02: IPv6

Q1. An IPv6 address is how many bits long?

  • 16
  • 32
  • 64
  • 128

Q2. The very first field in an IPv6 header is the _.

  • data payload field
  • version field
  • source address field
  • traffic class field

Q3. The IPv6 header field that indicates how many routers can forward a packet before it’s discarded is called the __.

  • next header field
  • router forward field
  • hop limit field
  • TTL

Quiz 03: The Cloud

Q1. A piece of software that runs and manages virtual machines is known as a __.

  • cloud storage device
  • hypervisor
  • cloud computing device
  • virtual instance

Q2. Office 365 Outlook is an example of _.

  • IaaS
  • PaaS
  • FttH
  • SaaS

Q3. A hybrid cloud is ____.

  • a combination of virtual hosts and virtual guests
  • a combination of a public cloud and a private cloud
  • a combination of a public cloud and hardware virtualization
  • a combination of a private cloud and a mesh network

Quiz 04: Verifying Connectivity

Q1. The protocol used to communicate network errors is known as __.

  • Traceroute
  • UDP
  • ICMP
  • TCP

Q2. The ping utility sends what message type?

  • Destination Network Unknown
  • Destination Network Unreachable
  • Echo Request
  • Echo Reply

Q3. On Windows, one of the tools you can use to verify connectivity to a specific port is __.

  • nc (netcat)
  • Test-NetConnection
  • tracert
  • ping

The Bits and Bytes of Computer Networking Graded Assessment Answers

Click here to Download

Next, Course Quiz Answers >>

Operating Systems and You: Becoming a Power User Quiz Answers

<< Previous Course Quiz Answers

Technical Support Fundamentals Coursera Quiz Answers

There are 5 Courses in Google IT Support Professional Certificate

Course 1: Technical Support Fundamentals

Course 2: The Bits and Bytes of Computer Networking

Course 3: Operating Systems and You: Becoming a Power User

Course 4: System Administration and IT Infrastructure Services

Course 5: IT Security: Defense against the digital dark arts

Share your love

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *