The Bits and Bytes of Computer Networking Coursera Quiz Answers

All Weeks The Bits and Bytes of Computer Networking Coursera Quiz Answers

Week 1: Introduction To Networking Quiz Answers

Q1. How many octets are there in a MAC address?

  • 5
  • 8
  • 4
  • 6

Q2. What address is used for Ethernet broadcasts?

  • 00:00:00:00:00:00
  • 11:11:11:11:11:11
  • FF:FF:FF:FF:FF:FF
  • FF:00:FF:00:FF:00

Q3. What is a cyclical redundancy check?

  • A technique that allows for multiple logical LANs to operate on the same equipment
  • The actual data being transported by an Ethernet frame
  • A way for two computers to synchronize their clocks
  • A mathematical calculation used to ensure that all data arrived intact

Quiz 02: Networking Devices

Q1. Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply.

  • A hub is a physical layer device, and a switch is a data link layer device.
  • A hub causes larger collision domains.
  • A switch remembers which devices are connected on each interface, while a hub does not.
  • Hubs are more sophisticated versions of switches.

Q2. What does LAN stand for?

  • Locally available network
  • Local area network
  • Little area network
  • Large area network

Q3. What’s a router?

  • A network device used specially for fiber cables
  • A more advanced version of a switch
  • A device that knows how to forward data between independent networks
  • A physical layer device that prevents crosstalk

Quiz 03: TCP/IP

Q1. Which of the following is an example of a network layer (layer 3) protocol?

  • Ethernet
  • IP
  • UDP
  • TCP

Q2. What’s the difference between a client and a server?

  • Clients and servers are different names for the same thing.
  • A server requests data, and a client responds to that request.
  • Clients operate on the data link layer, and servers operate on the network layer.
  • A client requests data, and a server responds to that request.

Q3. Which of the following are examples of layers of our five-layer network model? Check all that apply.

  • The physical layer
  • The application layer
  • The presentation layer
  • The transport layer

Q1. How many octets are there in a MAC address?

  • 5
  • 8
  • 4
  • 6

Q2. What address is used for Ethernet broadcasts?

  • 00:00:00:00:00:00
  • 11:11:11:11:11:11
  • FF:FF:FF:FF:FF:FF
  • FF:00:FF:00:FF:00

Q3. What is a cyclical redundancy check?

  • A technique that allows for multiple logical LANs to operate on the same equipment
  • The actual data being transported by an Ethernet frame
  • A way for two computers to synchronize their clocks
  • A mathematical calculation used to ensure that all data arrived intact

Quiz 05: The Physical Layer

Q1. What is the type of modulation used by twisted pair cable computer networks known as?

  • Line crimping
  • Simplex communication
  • Line coding
  • RJ45

Q2. What’s the difference between full and half duplex?

  • Full duplex is slower than half duplex.
  • Full duplex allows communications in two directions at the same time; half duplex means that only one side can communicate at a time.
  • Full duplex is a form of simplex communications.
  • Half duplex occurs when hubs are in use; full duplex occurs when switches are in use.

Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 02 Quiz Answers

Quiz 01: Routing

Q1. Select examples of routing protocols. Check all that apply.

  • Border Gateway Protocol
  • Routing Information Protocol
  • Transmission Control Protocol
  • Hypertext Transfer Protocol
  • User Datagram Protocol

Q2. Who is permitted to use non-routable address space?

  • Anyone
  • The IANA
  • It’s for testing purposes only
  • The IETF

Q3. A typical routing table may contain which of the following? Check all that apply.

  • Destination address
  • Total hops
  • Destination network
  • TTL

Quiz 02: Subnetting

Q1. What does CIDR stand for?

  • Classless Internet Destination Routing
  • Classfull Inter-Destination Routing
  • Classless Inter-Domain Routing
  • Classfull Identification Routing

Q2. Which of the following is a correct form of CIDR notation?

  • 192.168.1.0:24
  • 192.168.1.0/24
  • 192.168.1.0\24
  • 192.168.1.0 + 255.255.255.0

Q3. How many octets does a subnet mask have?

  • 1
  • 2
  • 3
  • 4

Quiz 03: The Network Layer

Q1. Please select all of the valid IP addresses. Check all that apply.

  • 123.456.123.456
  • 192.168.1.1
  • 8.8.8.8
  • 257.70.312.49

Q2. What happens to the TTL field of an IP datagram every time it reaches a router?

  • The TTL field is decremented by one.
  • The TTL field is reset to zero.
  • The TTL field is used for a cyclical redundancy check.
  • The TTL field is incremented by one.

Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 03 Quiz Answers

Quiz 01: The Application Layer

Q1. Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below.

  • The interconnection layer
  • The encryption layer
  • The presentation layer
  • The session layer
  • The compression layer

Q2. An example of something that operates at the application layer is:

  • A router
  • TCP
  • A web browser
  • UDP

Q3. What’s the standard number for a TTL field?

8
16
32
64

Quiz 02: The Transport Layer

Q1. What ordering of TCP flags makes up the Three-way Handshake?

  • FIN, FIN/ACK, ACK
  • SYN, SYN/ACK, ACK
  • SYN, ACK, SYN, ACK
  • SYN, ACK, FIN

Q2. Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits is a port field?

  • 4 bits
  • 8 bits
  • 16 bits
  • 32 bits

Q3. Please select all valid TCP control flags.

  • WAIT
  • LISTEN
  • CLOSE
  • ACK
  • RST
  • URG

Q4. A device that blocks traffic that meets certain criteria is known as a __.

  • Firewall
  • Router
  • Switch
  • Hub

Peer Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 04 Quiz Answers

Quiz 01: Dynamic Host Configuration Protocol

Q1. What are the four things that all computers need configured in order to operate on a modern network? Check all that apply.

  • An NTP server
  • A TCP port
  • A name server
  • An IP address
  • A default gateway
  • A subnet mask
  • A MAC address

Q2. When using Fixed Allocation DHCP, what’s used to determine a computer’s IP?

  • A record
  • Location
  • A MAC address
  • A subnet mask

Q3. The process by which a client configured to use DHCP attempts to get network configuration information is known as _____.

  • DHCP Discovery
  • DHCP Request
  • DHCP Offer
  • DHCP Acknowledgement

Quiz 02: Name Resolution in Practice

Q1. An A Record contains what?

  • A CNAME
  • An IPv4 address
  • An IPv6 address
  • A fully qualified domain name

Q2. Select all that are true.

  • One domain name can point to one IP.
  • One domain name can point to many IPs.
  • Many domain names can point to the same IP.

Q3. MX stands for __.

  • Micro extreme
  • Micro exchange
  • Mail exchange
  • Meta exchange

Q4. A fully qualified domain name can contain how many characters?

  • 63
  • 64
  • 127
  • 255

Quiz 03: Name Resolution

Q1. What transport layer protocol does DNS normally use?

  • TCP
  • IP
  • ICMP
  • UDP

Q2. A DNS TTL determines what?

  • How many steps there are in the resolution process
  • How far away a DNS can be from you
  • How many DNS resolutions can take place before the IP has to change
  • How long a DNS entry is allowed to be cached

Q3. How many root servers are there?

  • 8
  • 13
  • 16
  • 17

Quiz 04:Network Address Translation

Q1. NAT addresses concerns over the dwindling IPv4 address space by _______.

  • allowing networks to use fewer IP addresses overall.
  • allowing users to move to IPv6 when they want.
  • allowing computers using non-routable address space to communicate with the Internet.
  • performing IP masquerading.

Q2. What technique allows for inbound traffic through a NAT?

  • Port preservation
  • Port forwarding
  • Port authority
  • Ephemeral ports

Q3. The total number of IPv4 addresses is approximately:

  • 4.2 million
  • 4.2 billion
  • 4.2 trillion
  • Uncountable

Quiz 05: VPNs & Proxies

Q1. Two-factor authentication is_________________________.

  • a method where you need two passwords.
  • a method that requires two usernames.
  • a method where you authenticate twice.
  • a method where you need more than a username and a password.

Q2. VPNs are known as a _ protocol.

  • connectionless
  • data link layer
  • tunneling
  • network layer

Q3. A proxy is something that ___________.

  • sends data across a single network segment.
  • communicates on behalf of something else.
  • encrypts traffic sent across the Internet.
  • allows for many devices to speak to one other device.

Peer Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 05 Quiz Answers

Quiz 01: Broadband Internet

Q1. T1 is short for __.

  • Transportation System 1.
  • Transmission System 1.
  • Transportation 1.
  • Transmission 1.

Q2. How fast is a T1 line?

  • 1.544 Mb/sec
  • 44.763 Mb/sec
  • 1 Mb/sec
  • 128 Mb/sec

Q3. Select all statements that are true of cable internet connections.

  • They’re broadband connections.
  • They’re dial-up connections.
  • They’re shared bandwidth connections.
  • They’re wireless connections.

Quiz 02:POTS and Dial-up

Q1. Another term for POTS, or the Plain Old Telephone System, is ___.

  • Public Switched Telephone Network.
  • Phone Switched Transport Network.
  • Public Switched Telephone Exchange.
  • Public Available Telephone Network.
  • Public Available Telephone Exchange.

Q2. A baud rate is a measurement of the number of __________.

  • data segments that can be sent across a telephone line every second.
  • bits that can be sent across a telephone line every second.
  • bytes that can be sent across a telephone line every second.
  • packets that can be sent across a telephone line every second.

Quiz 03: WANs

Q1. WAN stands for __.

  • Wide Area Network.
  • Wired Area Network.
  • Wireless Area Network.
  • Wireless Local Area Network.

Q2. In a WAN, the area between a demarcation point and the ISP’s core network is known as _.

  • an access point
  • a local loop
  • a Local Area Network
  • a local link

Q3. A point-to-point VPN is also known as a __.

  • site-to-site VPN
  • one-to-many VPN
  • port forwarding VPN
  • data link VPN

Quiz 04: Wireless Networking

Q1. How many address fields does an 802.11 header have?

  • 1
  • 2
  • 3
  • 4

Q2. A wireless channel is __.

  • a portion of a frequency band.
  • a point-to-point wireless connection.
  • a collision domain.
  • an example of an ad-hoc network

Q3. Choose all of the frequencies that wireless networks typically operate on.

  • 88Mhz
  • 1.544Ghz
  • 2.4Ghz
  • 5Ghz

Peer Graded Assessment

Click here to Download

The Bits and Bytes of Computer Networking Week 06 Quiz Answers

Quiz 01: Digging into DNS

Q1. One of Level 3’s public DNS servers is __.

  • 4.2.2.3
  • 8.8.8.8
  • 127.0.0.1
  • 192.168.1.1

Q2. A DNS resolver tool available on all major desktop operating systems is __.

  • host
  • tracert
  • ping
  • nslookup

Q3. The organization responsible for DNS at a global level is __.

  • Google
  • RFC
  • ICANN
  • IANA

Quiz 02: IPv6

Q1. An IPv6 address is how many bits long?

  • 16
  • 32
  • 64
  • 128

Q2. The very first field in an IPv6 header is the _.

  • data payload field
  • version field
  • source address field
  • traffic class field

Q3. The IPv6 header field that indicates how many routers can forward a packet before it’s discarded is called the __.

  • next header field
  • router forward field
  • hop limit field
  • TTL

Quiz 03: The Cloud

Q1. A piece of software that runs and manages virtual machines is known as a __.

  • cloud storage device
  • hypervisor
  • cloud computing device
  • virtual instance

Q2. Office 365 Outlook is an example of _.

  • IaaS
  • PaaS
  • FttH
  • SaaS

Q3. A hybrid cloud is ____.

  • a combination of virtual hosts and virtual guests
  • a combination of a public cloud and a private cloud
  • a combination of a public cloud and hardware virtualization
  • a combination of a private cloud and a mesh network

Quiz 04: Verifying Connectivity

Q1. The protocol used to communicate network errors is known as __.

  • Traceroute
  • UDP
  • ICMP
  • TCP

Q2. The ping utility sends what message type?

  • Destination Network Unknown
  • Destination Network Unreachable
  • Echo Request
  • Echo Reply

Q3. On Windows, one of the tools you can use to verify connectivity to a specific port is __.

  • nc (netcat)
  • Test-NetConnection
  • tracert
  • ping

The Bits and Bytes of Computer Networking Graded Assessment Answers

Click here to Download

Next, Course Quiz Answers >>

Operating Systems and You: Becoming a Power User Quiz Answers

<< Previous Course Quiz Answers

Technical Support Fundamentals Coursera Quiz Answers

There are 5 Courses in Google IT Support Professional Certificate

Course 1: Technical Support Fundamentals

Course 2: The Bits and Bytes of Computer Networking

Course 3: Operating Systems and You: Becoming a Power User

Course 4: System Administration and IT Infrastructure Services

Course 5: IT Security: Defense against the digital dark arts

Team Networking Funda
Team Networking Funda

We are Team Networking Funda, a group of passionate authors and networking enthusiasts committed to sharing our expertise and experiences in networking and team building. With backgrounds in Data Science, Information Technology, Health, and Business Marketing, we bring diverse perspectives and insights to help you navigate the challenges and opportunities of professional networking and teamwork.

Leave a Reply

Your email address will not be published. Required fields are marked *