IP Addressing Advanced Quiz 5
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quiz 5
1. What does "uRPF" (Unicast Reverse Path Forwarding) help prevent?
Packet loss
IP address spoofing
DHCP conflicts
2. Which protocol is used to provide IP address redundancy by allowing multiple routers to share a Virtual IP?
DNS
OSPF
HSRP or VRRP
3. What is "IPsec" used for?
Authenticating and encrypting IP packets
Speeding up the routing table lookups
Assigning IP addresses to remote users
4. Which part of the IPsec suite provides data confidentiality?
AH (Authentication Header)
ESP (Encapsulating Security Payload)
IKE (Internet Key Exchange)
5. What is a "Split-Horizon" rule used for in distance-vector protocols?
To increase the speed of the CPU
To prevent routing loops
To divide a network into two subnets
6. What is "Traffic Shaping"?
Changing the format of an IP address
Deleting unauthorized packets
Buffering and delaying traffic to stay within a bandwidth limit
7. What is "Differentiated Services" (DiffServ) used for?
Quality of Service based on IP precedence or DSCP values
Translating IPv4 to IPv6
Hiding the internal network structure
8. Which attack involves flooding a target with spoofed ICMP Echo Requests?
Man-in-the-Middle
Smurf Attack
SQL Injection
9. What is the "MTU" (Maximum Transmission Unit)?
The maximum number of users on a subnet
The largest size packet that can be sent over a network link
The total uptime of a router
10. What happens if an IP packet is larger than the MTU and the "Don't Fragment" (DF) bit is set?
The packet is compressed
The packet is split into pieces
The packet is dropped and an ICMP error is sent
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network