Address Resolution Protocol Question & Answers September 6, 2022 By WatElectronics This article lists 75 Address Resolution Protocol || ARP MCQs for engineering students. All the Address Resolution Protocol || ARP Questions & Answers given below include a hint and a link wherever possible to the relevant topic. This is helpful for users who are preparing for their exams, interviews, or professionals who would like to brush up on the fundamentals of Address Resolution Protocol || ARP. A logic address is used to send or receive messages in most cases of computers or applications. However, the communication relies upon Physical address i.e., the MAC Address present at the second layer of the OSI reference model. To make the devices communicate, our intention is to get the MAC destination address. For this purpose, ARP was introduced. This protocol is responsible for translating IP into Physical Addresses. ARP is considered one of the most prominent protocols in the Network layer of the OSI reference model. The connection of IP to MAC address provided by ARP needs to map the addresses because of the distinct lengths of addresses. Dynamic mapping is possible by ARP. MAC address is the Data Link Layer that terminates and establishes connections among the physical devices to transfer the data. An IP address is the Network layer that forwards the packets to various routers, and the ARP present works among these layers. In IP version 6 network Neighbour Discovery protocol provides ARP functioning. It is referred to as the Request-Response protocol. 1). What connects IP address to the Physical address of devices? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 2). How long is the IP address? 32 Bits 48 Bits 64 Bits 128 Bits Hint 3). _________ translates address consisting 32 bits into 48 & Vice-versa? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 4). What is the necessity of Address Resolution Protocol (ARP)? Translate Address Bits Finds MAC Address Matches IP Address to MAC Address All Mentioned Above Hint 5). Address Resolution Protocol (ARP) cache is ________? Static Dynamic Constant Fixed Hint 6). ARP cache’s size has been __________? Limited by Design Unlimited by Design Undefined Infinite Hint 7). What is the use of ARP cache? Design Intended for Privacy Provides Security Prevents IP Addresses From Stealing All Mentioned Above Hint 8). Unutilized address is removed in ________ process? Holding Purging Dirtying Keeping Hint 9). Packets to get delivered to host, arrives at ______? Exit Gateway End b & c Hint 10). What are the various types of ARP? Proxy ARP Reverse ARP Inverse ARP All Mentioned Above Hint 11). In what technique, Proxy device answers the request of ARP? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 12). What type of ARP doesn’t get prompted to the request made by ARP? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 13). Host machines that don’t know their self IP address use ____________ to get discovered? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 14). What uses MAC addresses to discover IP addresses? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 15). Without ________ ,it is impossible to detect the MAC address of other hosts? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 16). _________ creates the entries of addresses on fly? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 17). If _______ goes unsupported, entries in the directory made manually? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 18). ARP Spoofing is also referred to as _______? ARP Poison Routing ARP Cache Poisoning ARP Preference Routing a & b Hint 19). _______ attacks are considered to be dangerous? ARP Poison Routing ARP Cache Poisoning ARP Spoofing All Mentioned Above Hint 20). What messages sent to the target in an ARP Poisoning attack? Fake Real True Rare Hint 21). What is MITM ? Man-in-the-Middle Attacks Memory-to-Memory Machine-to-Machine Memory-to-Machine Hint 22). In what type of attack do messages get altered between the parties? ARP Poison Routing ARP Cache Poisoning ARP Spoofing Man-in-the-Middle Attacks Hint Read More about Transport Layer 23). What type of attack occurs if the malware gets distributed? ARP Poison Routing ARP Cache Poisoning ARP Spoofing Man-in-the-Middle Attacks Hint 24). What happens in the MITM attack? Messages are Manipulated Malware gets Distributed Attacker Control Victims Web Browser All Mentioned Above Hint 25). Why do MITM attacks occur? To Capture Personal Information To Capture Financial Data a & b Messages are not Transferred Hint Address Resolution Protocol MCQs for Interviews 26). ARP Spoofing enables ___________ cyberattacks? Man-in-the-Middle Attacks Denial-of-Service Attacks Session Hijacking All Mentioned Above Hint 27). What attack occur on fraud victims with e-commerce websites and online banking? Man-in-the-Middle Attacks Denial-of-Service Attacks Session Hijacking All Mentioned Above Hint 28). What is DoS Attack? Denial-of-Service Attack Distribution-of-Server Attack Denial-of-Synchronization Attack Distribution-of-Sync Attack Hint 29). What attack makes user unable to access the system, network & server? Man-in-the-Middle Attacks Denial-of-Service Attacks Session Hijacking All Mentioned Above Hint 30). DoS attack in large-scale is referred to as ________? Distributed Denial-of-Service Attacks Man-in-the-Middle Attacks Session Hijacking ARP Spoofing Hint 31). More of the sources in a system are flooded with traffic in ________? Distributed Denial-of-Service Attacks Man-in-the-Middle Attacks Session Hijacking ARP Spoofing Hint 32). ______ attacks can exploit the vulnerability in Network protocols? Denial-of-Service Attacks Man-in-the-Middle Attacks Session Hijacking ARP Spoofing Hint 33). The services are easily overwhelmed and get unavailable in ________ attacks? Denial-of-Service Attacks Man-in-the-Middle Attacks Session Hijacking ARP Spoofing Hint 34). What happens if a cyber attacker steals a User ID? Denial-of-Service Attacks Man-in-the-Middle Attacks Session Hijacking ARP Spoofing Hint 35). Attacker in ______ gets intercepted to authentication and intrudes for real? Denial-of-Service Attacks Man-in-the-Middle Attacks Session Hijacking ARP Spoofing Hint 36). What is the size of the ARP Packet? 28 Bytes 28 Bits 32 Bytes 32 Bits Hint 37). Which field specifies the Protocol type of Network link? Hardware Type Protocol Type Sender Hardware Address Sender Protocol Address Hint 38). Internetwork protocol for ARP intended request is specified by ______? Hardware Type Protocol Type Sender Hardware Address Sender Protocol Address Hint 39). ___________ specify the address length of hardware? Hardware Type Protocol Type Sender Hardware Address Hardware Length Hint 40). Length of Internetwork address is specified in _______? Hardware Type Protocol Type Hardware Length Protocol Length Hint 41). What specifies the operation performed by the sender? Hardware Type Operation Hardware Length Protocol Length Hint 42). What is the Sender Hardware Address? Sender’s Media Address Internetwork Address of Sender Media Address of Intended Receiver Internetwork Address of Receiver Hint 43). What is the Sender Protocol Address? Sender’s Media Address Internetwork Address of Sender Media Address of Intended Receiver Internetwork Address of Receiver Hint 44). ARP Requests get ignored in what field? Hardware Type Target Hardware Address Hardware Length Protocol Length Hint 45). In ARP Reply ________ indicates the host address originated from the request of ARP? Hardware Type Target Hardware Address Hardware Length Protocol Length Hint 46). What does a Target Protocol Address consist of? Sender’s Media Address Internetwork Address of Sender Media Address of Intended Receiver Internetwork Address of Receiver Hint 47). What is IANA? Internet Assigned Numbers Authority Integer Addition Numbers Application Income Assigned Numerical Authority Internet Assigned Numerical Application Hint 48). What is used as a simple protocol of announcement? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 49). _________ is the broadcast of ARP request? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 50). THA is set as _______ in the Gratuitous ARP message? 0 1 Infinite Constant Hint Address Resolution Protocol MCQs for Exams 51). __________ are standard based methods? ARP Request ARP Reply a & b None Hint 52). Which standard method of ARP is preferable? ARP Request ARP Reply a & b None Hint 53). _________ utilized in Zeroconf Protocol? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 54). Operating system issues an ________ announcement at the time of startup? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 55). ________ announcement ensures the address selected by the host remains unused by some other host? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 56). Why do network interfaces use announcements of ARP? Provides Load Balancing Doesn’t Provide Load Balancing Incoming Traffic is Balanced a & c Hint 57). ____________is the process to resolve layer-2 address via Virtual Private Wire Service? ARP Mediation ARP Announcement Address Mapping ARP Spoofing Hint 58). _________ used in obtaining Network layer address? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 59). IARP has ___________ as of ARP? Same Packet Format Distinct Operation Codes Same Operation Codes a & b Hint 60). Primarily InARP is utilized in __________? Frame Relay ATM Networks a & b Switching Hint 61). Which of these protocol replaced Bootstrap protocol? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 62). After MAC address resolved, ARP is sent to source and is Stored at____________? ARP Cache ARP Announcement Operating System Local Area Network Hint 63). Time period in which MAC addresses reside in ARP Cache is known as ________? ARP Cache Time In ARP Cache Time Out ARP Cache Time Period ARP Time Interval Hint 64). ARP request is ______? Broadcast Unicast a & b None Hint 65). ARP reply is ________? Broadcast Unicast a & b None Hint 66). ________ is used in detecting IP conflicts? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 67). Gratuitous ARP utilized in ________? Update ARP Mapping Table Switch Port MAC Address Table Detect IP Conflicts All Mentioned Above Hint 68). What uses ARP stuffing? Networked Camera Networked Power Distribution Devices a & b None Hint 69). What is the Protocol extension of ARP? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 70). ______ consists of SPA in Target field? Proxy ARP Reverse ARP Inverse ARP Gratuitous ARP Hint 71). _________ is used in updating hosts? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 72). ARP message size is depending upon _______? Link-Layer Address Size Network Layer Address Size Transport Layer Address Size a & b Hint 73). 0x0806 Ether value used in the identification of _________ frames? Address Resolution Protocol File Transfer Protocol User Datagram Protocol Transmission Control Protocol Hint 74). ARP never routes at ________ nodes? Single Dual Networking Internetworking Hint 75). In IP version 6 _________ provide ARP functionality? Neighbor Discovery Protocol File Transfer Protocol User Datagram Protocol Transmission Control Hint Read More About UDP Protocol Question & Answers For More MCQs UDP Protocol Question & Answers I2S Protocol Question & Answers CAN Protocol Question & Answers Wireless Application Protocol Question and Answers SPI Protocol Question & Answers I2C Protocol Question & Answers Modbus Protocol Question & Answers Please fill in the comment box below. Time is Up! Time's up