ads

Networking

Multiple-choice questions (MCQs) based on networking


1. Which of the following is NOT a type of network topology?

   a) Bus

   b) Star

   c) Cylinder

   d) Mesh


Answer: c) Cylinder


2. Which protocol is used for transferring files over the internet?

   a) TCP/IP

   b) FTP

   c) HTTP

   d) SMTP


Answer: b) FTP


3. What does DHCP stand for?

   a) Dynamic Host Configuration Protocol

   b) Domain Hosting Control Protocol

   c) Distributed Host Configuration Protocol

   d) Domain Host Configuration Protocol


Answer: a) Dynamic Host Configuration Protocol


4. Which device is used to connect multiple computers in a network and forward data packets?

   a) Modem

   b) Router

   c) Switch

   d) Hub


Answer: c) Switch


5. Which OSI layer is responsible for logical addressing?

   a) Data Link Layer

   b) Network Layer

   c) Transport Layer

   d) Application Layer


Answer: b) Network Layer


6. What is the purpose of DNS?

   a) To convert domain names into IP addresses

   b) To encrypt data during transmission

   c) To manage network traffic

   d) To authenticate users


Answer: a) To convert domain names into IP addresses


7. What is the maximum length of an IPv4 address?

   a) 32 bits

   b) 64 bits

   c) 128 bits

   d) 256 bits


Answer: a) 32 bits


8. Which of the following is a private IP address?

   a) 192.168.1.1

   b) 172.16.0.1

   c) 10.10.10.1

   d) All of the above


Answer: d) All of the above


9. Which protocol is used for sending email?

   a) FTP

   b) SMTP

   c) POP3

   d) SNMP


Answer: b) SMTP


10. What does LAN stand for?

    a) Local Area Network

    b) Large Area Network

    c) Longitudinal Access Network

    d) Localized Access Network


Answer: a) Local Area Network




11. What is the primary function of a firewall in a network?

    a) To filter and control incoming and outgoing network traffic

    b) To physically connect different network segments

    c) To amplify network signals for long-distance transmission

    d) To manage domain name registration


Answer: a) To filter and control incoming and outgoing network traffic


12. Which of the following is NOT a valid network addressing scheme?

    a) MAC address

    b) IP address

    c) TCP address

    d) Subnet mask


Answer: c) TCP address


13. Which networking device operates at the Data Link Layer of the OSI model?

    a) Router

    b) Bridge

    c) Repeater

    d) Gateway


Answer: b) Bridge


14. Which of the following is a characteristic of a packet-switched network?

    a) Dedicated communication path

    b) Circuit switching

    c) Fixed data rate

    d) Variable data routing


Answer: d) Variable data routing


15. What is the maximum data transfer rate of a standard Ethernet connection?

    a) 10 Mbps

    b) 100 Mbps

    c) 1 Gbps

    d) 10 Gbps


Answer: c) 1 Gbps


16. Which protocol is commonly used for secure communication over the internet?

    a) HTTP

    b) FTP

    c) SSH

    d) Telnet


Answer: c) SSH


17. In networking, what does the term "latency" refer to?

    a) The amount of data that can be transferred in a given time period

    b) The time taken for a packet to travel from the source to the destination

    c) The number of devices connected to a network

    d) The physical distance between network devices


Answer: b) The time taken for a packet to travel from the source to the destination


18. Which protocol is used to assign IP addresses dynamically to devices on a network?

    a) DNS

    b) DHCP

    c) ARP

    d) ICMP


Answer: b) DHCP


19. Which networking device forwards data packets between different networks based on their IP addresses?

    a) Hub

    b) Switch

    c) Router

    d) Modem


Answer: c) Router


20. What is the purpose of NAT (Network Address Translation) in networking?

    a) To translate domain names into IP addresses

    b) To encrypt data during transmission

    c) To convert private IP addresses into public IP addresses

    d) To authenticate users


Answer: c) To convert private IP addresses into public IP addresses




21. Which of the following is a characteristic of a client-server network architecture?

    a) All nodes have equal responsibilities and capabilities.

    b) There is no centralized control or authority.

    c) Nodes are organized into a hierarchical structure.

    d) Certain nodes provide resources or services to other nodes.


Answer: d) Certain nodes provide resources or services to other nodes.


22. What is the function of a DNS server?

    a) To convert IP addresses into domain names

    b) To route data packets between networks

    c) To provide secure communication over the internet

    d) To convert domain names into IP addresses


Answer: d) To convert domain names into IP addresses


23. Which protocol is used for securely accessing a remote server?

    a) SMTP

    b) FTP

    c) SSH

    d) HTTP


Answer: c) SSH


24. In the TCP/IP protocol suite, which layer is responsible for establishing, maintaining, and terminating connections between devices?

    a) Network Layer

    b) Transport Layer

    c) Data Link Layer

    d) Application Layer


Answer: b) Transport Layer


25. What is the purpose of subnetting in networking?

    a) To divide a large network into smaller, manageable subnetworks

    b) To connect two or more LANs together

    c) To encrypt data during transmission

    d) To assign IP addresses dynamically


Answer: a) To divide a large network into smaller, manageable subnetworks


26. Which of the following is NOT a valid IPv6 address format?

    a) 2001:0db8:85a3:0000:0000:8a2e:0370:7334

    b) FE80:0000:0000:0000:ABCD:EF01:2345:6789

    c) 192.168.1.1

    d) 2001:db8::1


Answer: c) 192.168.1.1


27. Which networking device operates at the Physical Layer of the OSI model?

    a) Router

    b) Switch

    c) Repeater

    d) Firewall


Answer: c) Repeater


28. What does FTP stand for?

    a) File Transfer Protocol

    b) Fast Transmission Protocol

    c) File Transport Protocol

    d) File Transit Protocol


Answer: a) File Transfer Protocol


29. Which of the following is a characteristic of a peer-to-peer network?

    a) Centralized control

    b) Client-server architecture

    c) Equal sharing of resources among all nodes

    d) Hierarchical structure


Answer: c) Equal sharing of resources among all nodes



30. What is the purpose of a MAC address?

    a) To uniquely identify a device on a network

    b) To provide secure access to a network

    c) To convert domain names into IP addresses

    d) To route data packets between networks


Answer: a) To uniquely identify a device on a network



31. Which of the following is a characteristic of UDP (User Datagram Protocol)?

    a) Reliable and connection-oriented

    b) Guaranteed delivery of data packets

    c) Provides error checking and retransmission of lost packets

    d) Unreliable and connectionless


Answer: d) Unreliable and connectionless


32. What is the primary function of a proxy server in a network?

    a) To filter and control network traffic

    b) To connect multiple LANs together

    c) To provide DNS resolution services

    d) To authenticate users for network access


Answer: a) To filter and control network traffic


33. Which of the following is NOT a valid wireless networking standard?

    a) IEEE 802.11n

    b) Bluetooth

    c) Ethernet

    d) IEEE 802.11ac


Answer: c) Ethernet


34. What does VPN stand for?

    a) Virtual Personal Network

    b) Virtual Private Network

    c) Visible Public Network

    d) Virtual Protocol Network


Answer: b) Virtual Private Network


35. Which protocol is used to automatically assign IP addresses to devices on a network?

    a) TCP

    b) UDP

    c) DHCP

    d) DNS


Answer: c) DHCP


36. In which layer of the OSI model does SSL/TLS operate?

    a) Transport Layer

    b) Data Link Layer

    c) Presentation Layer

    d) Application Layer


Answer: a) Transport Layer


37. What is the function of ARP (Address Resolution Protocol)?

    a) To map IP addresses to MAC addresses

    b) To route data packets between networks

    c) To establish secure connections over the internet

    d) To convert domain names into IP addresses


Answer: a) To map IP addresses to MAC addresses


38. Which of the following is NOT a component of a typical network protocol suite?

    a) Application Layer

    b) Transport Layer

    c) Presentation Layer

    d) Physical Layer


Answer: c) Presentation Layer


39. What is the purpose of a VLAN (Virtual Local Area Network)?

    a) To connect multiple LANs together

    b) To provide wireless network access

    c) To segment a single physical LAN into multiple logical LANs

    d) To encrypt data during transmission


Answer: c) To segment a single physical LAN into multiple logical LANs


40. Which protocol is used for remotely managing network devices such as routers and switches?

    a) SNMP

    b) HTTP

    c) SMTP

    d) DNS


Answer: a) SNMP



41. Which of the following protocols is commonly used for sending and receiving email?

    a) FTP

    b) SMTP

    c) HTTP

    d) ICMP


Answer: b) SMTP


42. What is the primary purpose of a subnet mask?

    a) To identify the network portion of an IP address

    b) To identify the host portion of an IP address

    c) To encrypt data packets for secure transmission

    d) To assign IP addresses dynamically


Answer: a) To identify the network portion of an IP address


43. Which device is used to connect multiple network segments together?

    a) Router

    b) Switch

    c) Hub

    d) Bridge


Answer: d) Bridge


44. In networking, what does the acronym WAN stand for?

    a) Wide Area Network

    b) Wireless Access Network

    c) Wired Area Network

    d) Wireless Application Network


Answer: a) Wide Area Network


45. Which of the following is NOT a common wireless encryption protocol?

    a) WEP

    b) WPA

    c) SSL

    d) WPA2


Answer: c) SSL


46. What is the purpose of NAT (Network Address Translation)?

    a) To translate domain names into IP addresses

    b) To encrypt data during transmission

    c) To assign IP addresses dynamically

    d) To convert private IP addresses into public IP addresses


Answer: d) To convert private IP addresses into public IP addresses


47. Which OSI layer is responsible for error detection and correction?

    a) Transport Layer

    b) Data Link Layer

    c) Network Layer

    d) Presentation Layer


Answer: b) Data Link Layer


48. What is the primary function of ICMP (Internet Control Message Protocol)?

    a) To transfer files between computers

    b) To manage domain name registration

    c) To diagnose network connectivity issues

    d) To encrypt data packets for secure transmission


Answer: c) To diagnose network connectivity issues


49. Which protocol is used to resolve domain names to IP addresses?

    a) DHCP

    b) DNS

    c) FTP

    d) SMTP


Answer: b) DNS


50. What is the purpose of a MAC address?

    a) To uniquely identify a device on a network

    b) To route data packets between networks

    c) To translate domain names into IP addresses

    d) To assign IP addresses dynamically


Answer: a) To uniquely identify a device on a network



Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Learn More
Ok, Go it!