Take the networking IQ test

There's a lot to know, from Ethernet to Wi-Fi. Show off your networking smarts with this quiz

The technologies that go into networking are changing all the time, even as researchers create new ones that make the job of IT pros more challenging and more complex. It’s hard to keep up. Here’s a brief quiz on some aspects of the technologies used to build networks to see how well you’ve been refreshing your knowledge as well as some interesting non-technical tidbits. Keep track of your score and find out at the end how well you did.

PART 1: So you think you know networking?

virtual machines

What runs virtual machines on a host computer?

hypervisor

What runs virtual machines on a host computer?

Answer: The hypervisor (virtual machine monitor)

Ethernet

What is the 5-4-3 rule in an Ethernet networking?

Ethernet

What is the 5-4-3 rule in an Ethernet networking?

Answer: It describes how to avoid collisions when laying out a hubbed network: a maximum of 5 network segments linked by 4 hubs with only 3 segments containing active senders.

LTE wireless network

In a standard LTE wireless network, how many clients can be supported by each 5MHz cell?

LTE wireless network

In a standard LTE wireless network, how many clients can be supported by each 5MHz cell?

Answer: 200

software-defined network

In a software-defined network, what two planes are decoupled in order to simplify networking?

software-defined network

In a software-defined network, what two planes are decoupled in order to simplify networking?

Answer: The control plane and the data plane.

software-defined network

What coordinates the control and data planes in a software-defined network?

software-defined network

What coordinates the control and data planes in a software-defined network?

Answer: The controller

IPv6

To provide more IP addresses, the address space in IPv6 is expanded to what length compared to 32 bits for IPv4?

IPv6

To provide more IP addresses, the address space in IPv6 is expanded to what length compared to 32 bits for IPv4?

Answer: 128 bits

VPN tunneling protocol

What VPN tunneling protocol is an option rolled into IPv6?

VPN tunneling protocol

What VPN tunneling protocol is an option rolled into IPv6?

Answer: IPSec

What networking technology was made possible in part by algorithms designed to detect faint radio signals emanating from microscopic black holes as they evaporate?

Wi-Fi

What networking technology was made possible in part by algorithms designed to detect faint radio signals emanating from microscopic black holes as they evaporated?

Answer: Wi-Fi (U.S. patent 5,487,069)

Category 5 cabling

Category 5 cabling contains eight wires color-coded blue, green, orange and what fourth color?

Category 5

Category 5 cabling contains eight wires color-coded blue, green, orange and what fourth color?

Answer: Brown (The other wires are white with stripes of one of the four colors.)

Gordon Moore

Gordon Moore observed that the number of what doubles about every two years?

Gordon Moore

Gordon Moore observed that the number of what doubles about every two years?

Answer: Transistors on integrated circuits. (Moore’s Law)

USB plugs

Why do USB plugs have right-side up and wrong-side up orientations rather than working either way?

USB plugs

Why do USB plugs have right-side up and wrong-side up orientations rather than working either way?

Answer: They were less expensive to make.

rootkits

Planting rootkits in programmable logic controllers was an innovation of what cyber-warfare worm?

rootkits
Credit: Wikipedia

Planting rootkits in programmable logic controllers was an innovation of what cyber-warfare worm?

Answer: Stuxnet

What networking technology is named after a Danish king?

Bluetooth

What networking technology is named after a Danish king?

Answer: Bluetooth, named after Harald “Bluetooth” Gormsson, who perhaps had bad teeth

X.509 certificates

X.509 certificates are an essential part of what encryption system?

Public key infrastructure

X.509 certificates are an essential part of what encryption system?

Answer: Public key infrastructure

Java

Java is derived from what coding language?

C++

Java is derived from what coding language?

Answer: C++

How’d you do?

0-3 – Rip Van Winkle
4-7 – Forrest Gump
8-11 – The Amazing Randi
12-15 – Albert Einstein