0% found this document useful (0 votes)
11 views

Networking MCQ

Networking

Uploaded by

Himanshu Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Networking MCQ

Networking

Uploaded by

Himanshu Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

1. What is the purpose of the OSI model?

• A) To create a standard for routers only


• B) To facilitate communication between different systems
• C) To define hardware components
• D) To encrypt data packets

2. Which layer of the OSI model is responsible for error detection and correction?

• A) Physical
• B) Data Link
• C) Network
• D) Application

3. What does DHCP stand for?

• A) Domain Host Control Protocol


• B) Dynamic Host Control Protocol
• C) Dynamic Host Configuration Protocol
• D) Domain Host Configuration Protocol

4. Which of the following is a private IP address?

• A) 192.168.0.1
• B) 8.8.8.8
• C) 172.32.1.1
• D) 10.10.10.10

5. What protocol is used to find the MAC address associated with an IP address?

• A) DNS
• B) ARP
• C) DHCP
• D) ICMP

6. Which of the following protocols operates at the transport layer of the OSI model?

• A) HTTP
• B) TCP
• C) FTP
• D) IP

7. What type of network is a PAN?

• A) Personal Area Network


• B) Public Access Network
• C) Private Area Network
• D) Portable Access Network

8. Which device is used to break up a collision domain?

• A) Hub
• B) Switch
• C) Modem
• D) Repeater
9. In the context of networking, what does NAT stand for?

• A) Network Access Translation


• B) Network Address Translation
• C) Node Address Translation
• D) Name Address Translation

10. Which layer in the TCP/IP model corresponds to the OSI model's Application, Presentation, and
Session layers?

• A) Transport
• B) Network
• C) Data Link
• D) Application

11. What is the primary function of a router?

• A) To filter traffic by MAC addresses


• B) To forward data packets between different networks
• C) To amplify the signal strength
• D) To connect multiple devices within the same network

12. What type of cable is commonly used for Ethernet connections?

• A) Fiber optic
• B) Coaxial
• C) Twisted pair
• D) Serial

13. Which protocol is used to securely transfer files over the internet?

• A) FTP
• B) HTTP
• C) SFTP
• D) TFTP

14. What is the purpose of the subnet mask in an IP address?

• A) To identify the default gateway


• B) To determine the network and host portions of an IP address
• C) To encrypt the data being transferred
• D) To assign a unique MAC address

15. What is the range of a Class C IP address?

• A) 1.0.0.0 to 127.255.255.255
• B) 128.0.0.0 to 191.255.255.255
• C) 192.0.0.0 to 223.255.255.255
• D) 224.0.0.0 to 239.255.255.255

16. What device would you use to connect a local area network (LAN) to the internet?

• A) Router
• B) Switch
• C) Hub
• D) Access Point

17. Which command is used to test the reachability of a host on an IP network?

• A) tracert
• B) nslookup
• C) ping
• D) ipconfig

18. Which port does HTTP use by default?

• A) 20
• B) 443
• C) 80
• D) 21

19. What protocol is commonly used to send email messages?

• A) POP3
• B) IMAP
• C) SMTP
• D) HTTP

20. Which of the following describes a VPN?

• A) Virtual Personal Network


• B) Virtual Public Network
• C) Virtual Protected Network
• D) Virtual Private Network

21. What does DNS stand for?

• A) Data Name System


• B) Domain Name Service
• C) Domain Name System
• D) Data Network Service

22. Which layer of the OSI model handles logical addressing?

• A) Transport
• B) Data Link
• C) Network
• D) Application

23. What type of IP address is 127.0.0.1?

• A) Broadcast address
• B) Public IP address
• C) Loopback address
• D) Multicast address
24. Which of the following is not a network topology?

• A) Star
• B) Bus
• C) Tree
• D) Modem

25. What is the primary function of a firewall?

• A) To route packets between networks


• B) To prevent unauthorized access to or from a private network
• C) To increase network speed
• D) To assign IP addresses

26. In which layer of the OSI model does encryption typically occur?

• A) Network
• B) Application
• C) Presentation
• D) Data Link

27. Which IP version uses 128-bit addresses?

• A) IPv4
• B) IPv5
• C) IPv6
• D) IPv2

28. Which of the following protocols is used to resolve a hostname to an IP address?

• A) DHCP
• B) DNS
• C) FTP
• D) HTTP

29. What does MTU stand for in networking?

• A) Maximum Transfer Unit


• B) Minimum Transmission Unit
• C) Maximum Transmission Unit
• D) Medium Transfer Unit

30. Which of the following is a connection-oriented protocol?

• A) UDP
• B) IP
• C) TCP
• D) ICMP

31. What is the function of a proxy server?

• A) To forward requests between a client and a server


• B) To serve as a backup for a main server
• C) To store and forward emails
• D) To act as a firewall

32. Which of the following is a common protocol used for network management?

• A) SNMP
• B) SSH
• C) SMTP
• D) SFTP

33. What type of attack involves overwhelming a network or service with excessive traffic?

• A) Phishing
• B) DDoS
• C) Man-in-the-Middle
• D) SQL Injection

34. What is the maximum transmission speed of a Gigabit Ethernet network?

• A) 10 Mbps
• B) 100 Mbps
• C) 1 Gbps
• D) 10 Gbps

35. What protocol is used for secure web browsing?

• A) HTTP
• B) FTP
• C) SSH
• D) HTTPS

36. What device is used to connect different network segments and determine the best path for data to
travel?

• A) Hub
• B) Bridge
• C) Router
• D) Switch

37. Which wireless encryption standard is considered the most secure?

• A) WEP
• B) WPA
• C) WPA2
• D) WPA3

38. What is the primary purpose of VLANs in a network?

• A) To separate broadcast domains


• B) To connect multiple networks together
• C) To manage bandwidth
• D) To enhance security

39. Which protocol is used to synchronize the time between network devices?

• A) NTP
• B) FTP
• C) TFTP
• D) ICMP

40. What does TTL stand for in networking?

• A) Time to Leave
• B) Time to Live
• C) Transfer to Live
• D) Transmission Time Limit

41. What is a mesh network topology?

• A) All devices are connected to a central hub


• B) Each device is connected to every other device
• C) Devices are connected in a linear fashion
• D) Devices are connected in a hierarchical structure

42. Which protocol is responsible for breaking data into smaller packets and reassembling them at the
destination?

• A) HTTP
• B) IP
• C) TCP
• D) UDP

43. Which of the following is a stateless protocol?

• A) TCP
• B) IP
• C) HTTP
• D) SMTP

44. Which layer of the OSI model ensures reliable delivery of data?

• A) Network
• B) Transport
• C) Data Link
• D) Physical

45. What is the main purpose of a VPN?

• A) To provide faster network speeds


• B) To provide secure communication over an unsecured network
• C) To assign IP addresses automatically
• D) To resolve domain names to IP addresses
46. What is the function of the tracert command in Windows?

• A) To trace the route that data takes to a destination


• B) To test the reachability of a host
• C) To display DNS server information
• D) To reset the network adapter

47. Which term refers to the delay between a data packet being sent and received?

• A) Bandwidth
• B) Latency
• C) Jitter
• D) Throughput

48. What is the purpose of port forwarding in networking?

• A) To hide the internal network from external users


• B) To direct traffic to a specific server on a private network
• C) To allow multiple devices to share a single public IP address
• D) To encrypt data being transmitted over the internet

49. What does ICMP stand for?

• A) Internet Control Message Protocol


• B) Internet Communication Monitoring Protocol
• C) Internet Connection Management Protocol
• D) Internet Control Management Protocol

50. Which technology is used for high-speed internet over traditional telephone lines?

• A) Fiber optics
• B) DSL
• C) Cable
• D) Satellite

51. What does the term "bandwidth" refer to in networking?

• A) The amount of data that can be transmitted in a given time period


• B) The physical distance between devices
• C) The reliability of a network connection
• D) The maximum number of devices on a network

52. Which protocol is used to dynamically assign IP addresses to devices on a network?

• A) DHCP
• B) DNS
• C) ARP
• D) ICMP

53. What is a typical default subnet mask for a Class A IP address?

• A) 255.255.0.0
• B) 255.255.255.0
• C) 255.0.0.0
• D) 255.255.255.255

54. Which of the following layers in the OSI model is responsible for error detection and correction?

• A) Physical
• B) Data Link
• C) Network
• D) Transport

55. What does NAT stand for in networking?

• A) Network Address Translation


• B) Network Access Technology
• C) Network Address Transfer
• D) Network Application Transmission

56. What type of address is used to identify devices on a local network?

• A) IP address
• B) MAC address
• C) Domain name
• D) Subnet mask

57. What type of attack intercepts and potentially alters the communication between two parties?

• A) DDoS
• B) Sniffing
• C) Phishing
• D) Man-in-the-Middle

58. Which of the following is NOT a feature of IPv6?

• A) Increased address space


• B) Simplified header format
• C) Support for multicast
• D) Compatibility with IPv4

59. What is the main function of an access point in a wireless network?

• A) To connect wired devices to a network


• B) To extend the range of a wireless network
• C) To encrypt wireless signals
• D) To assign IP addresses

60. Which layer of the OSI model is responsible for establishing, managing, and terminating connections?

• A) Application
• B) Presentation
• C) Session
• D) Transport
61. What is the maximum number of devices that can be connected in a single collision domain?

• A) 10
• B) 100
• C) Unlimited
• D) Depends on the network architecture

62. Which of the following is a characteristic of a TCP connection?

• A) Connectionless
• B) No error checking
• C) Reliable delivery
• D) No data segmentation

63. What does the term "broadcast" mean in networking?

• A) Sending data to a specific device


• B) Sending data to all devices on a network
• C) Sending data to a group of devices
• D) Sending data to the internet

64. What type of cable is commonly used for high-speed data connections?

• A) Coaxial cable
• B) Twisted pair cable
• C) Fiber optic cable
• D) HDMI cable

65. What does the term "throughput" refer to in networking?

• A) The theoretical maximum speed of a network


• B) The actual amount of data transmitted successfully over time
• C) The delay in data transmission
• D) The number of active connections in a network

66. In a subnetted network, what does a CIDR notation of /24 indicate?

• A) 24 bits are used for the network part of the address


• B) 24 bits are used for the host part of the address
• C) The maximum number of subnets is 24
• D) The maximum number of hosts is 24

67. Which command-line tool can be used to test connectivity to a remote host?

• A) nslookup
• B) ping
• C) netstat
• D) tracert

68. What does the term "firewall" refer to?

• A) A hardware device that connects multiple networks


• B) A software program that speeds up network performance
• C) A security device that monitors and controls incoming and outgoing network traffic
• D) A type of network cable

69. What is a disadvantage of using a hub in a network?

• A) Increased speed
• B) Increased security
• C) Collision domains are not separated
• D) Easy to manage

70. Which of the following is an example of a Layer 3 device?

• A) Switch
• B) Hub
• C) Router
• D) Bridge

71. What is the purpose of the Address Resolution Protocol (ARP)?

• A) To find the MAC address corresponding to an IP address


• B) To find the IP address corresponding to a MAC address
• C) To manage network traffic
• D) To resolve domain names

72. Which of the following IP addresses is a private IP address?

• A) 192.168.1.1
• B) 172.16.0.1
• C) 10.0.0.1
• D) All of the above

73. What does VLAN stand for?

• A) Virtual Local Area Network


• B) Variable Local Area Network
• C) Virtual Link Access Network
• D) Verified Local Area Network

74. In the OSI model, which layer is responsible for data encryption?

• A) Application
• B) Presentation
• C) Session
• D) Transport

75. Which of the following is a method to enhance network security?

• A) Using weak passwords


• B) Regular software updates
• C) Disabling firewalls
• D) Open Wi-Fi networks
76. What is the default port number for HTTP?

• A) 80
• B) 443
• C) 21
• D) 25

77. Which technology allows multiple virtual networks to coexist on a single physical network?

• A) NAT
• B) VLAN
• C) VPN
• D) DHCP

78. What is the role of a network switch?

• A) To connect multiple networks


• B) To filter and forward data packets to the correct destination
• C) To encrypt data transmissions
• D) To serve as a gateway between networks

79. Which protocol is used for secure file transfer?

• A) FTP
• B) SFTP
• C) HTTP
• D) TFTP

80. What is the primary function of the Domain Name System (DNS)?

• A) To translate IP addresses into domain names


• B) To assign IP addresses to devices
• C) To manage network traffic
• D) To secure network connections

81. What is the primary purpose of a router in a network?

• A) To connect devices within the same network


• B) To forward data packets between different networks
• C) To manage bandwidth
• D) To store data

82. Which of the following is a characteristic of a peer-to-peer network?

• A) Centralized control
• B) Dedicated servers
• C) Equal authority among devices
• D) Limited scalability

83. What type of network topology connects all devices to a single central hub?

• A) Star
• B) Ring
• C) Bus
• D) Mesh

84. In which layer of the OSI model does routing occur?

• A) Physical
• B) Data Link
• C) Network
• D) Transport

85. Which device is primarily used to isolate network segments?

• A) Hub
• B) Switch
• C) Router
• D) Firewall

86. What does QoS stand for in networking?

• A) Quality of Service
• B) Quantity of Security
• C) Quick Operation System
• D) Query of Sources

87. Which type of DNS record is used to map a domain name to an IP address?

• A) MX record
• B) CNAME record
• C) A record
• D) TXT record

88. What is the main advantage of using fiber optic cables over copper cables?

• A) Lower cost
• B) Greater bandwidth and speed
• C) Easier installation
• D) More flexibility

89. What type of firewall filters traffic based on the state of the connection?

• A) Packet-filtering firewall
• B) Stateful inspection firewall
• C) Proxy firewall
• D) Next-generation firewall

90. Which of the following protocols is used to retrieve email from a mail server?

• A) SMTP
• B) POP3
• C) IMAP
• D) Both B and C
91. Which protocol is used for secure communication over the Internet?

• A) HTTP
• B) FTP
• C) HTTPS
• D) SNMP

92. What does the term "latency" refer to in networking?

• A) The speed of data transmission


• B) The amount of data that can be transmitted
• C) The delay before a transfer of data begins
• D) The total bandwidth available

93. In a client-server network, what is the role of the client?

• A) To provide resources
• B) To request resources
• C) To manage network traffic
• D) To store data

94. What is the purpose of a subnet mask?

• A) To define the range of IP addresses in a subnet


• B) To encrypt data in transit
• C) To connect two different networks
• D) To assign IP addresses dynamically

95. Which of the following is NOT a valid IPv4 address?

• A) 192.168.0.1
• B) 256.100.50.25
• C) 10.0.0.5
• D) 172.16.254.1

96. What technology allows remote users to connect to a private network securely?

• A) VLAN
• B) VPN
• C) NAT
• D) ARP

97. Which of the following best describes the function of NAT (Network Address Translation)?

• A) It assigns IP addresses to devices on a local network


• B) It translates public IP addresses to private IP addresses and vice versa
• C) It monitors and controls incoming and outgoing traffic
• D) It connects different networks together

98. What is the maximum length of a Cat 5 Ethernet cable for reliable data transmission?

• A) 50 meters
• B) 100 meters
• C) 200 meters
• D) 500 meters

99. What type of attack involves overwhelming a system with traffic to render it unavailable?

• A) Phishing
• B) DDoS (Distributed Denial of Service)
• C) Man-in-the-Middle
• D) SQL Injection

100. Which of the following is a common use of a proxy server?

• A) To speed up network performance


• B) To assign IP addresses
• C) To filter and log internet traffic
• D) Both A and C

1. • B) To facilitate communication between different systems


2. • B) Data Link
3. • C) Dynamic Host Configuration Protocol
4. • A) 192.168.0.1
5. • B) ARP
6. • B) TCP
7. • A) Personal Area Network
8. • B) Switch
9. • B) Network Address Translation
10. • D) Application
11. B) To forward data packets between different networks
12. C) Twisted pair
13. C) SFTP
14. B) To determine the network and host portions of an IP address
15. C) 192.0.0.0 to 223.255.255.255
16. A) Router
17. C) ping
18. C) 80
19. C) SMTP
20. D) Virtual Private Network

21. C) Domain Name System


22. C) Network
23. C) Loopback address
24. D) Modem
25. B) To prevent unauthorized access to or from a private network
26. C) Presentation
27. C) IPv6
28. B) DNS
29. C) Maximum Transmission Unit
30. C) TCP
31. A) To forward requests between a client and a server
32. A) SNMP
33. B) DDoS
34. C) 1 Gbps
35. D) HTTPS
36. C) Router
37. D) WPA3
38. A) To separate broadcast domains
39. A) NTP
40. B) Time to Live
41. B) Each device is connected to every other device
42. C) TCP
43. C) HTTP
44. B) Transport
45. B) To provide secure communication over an unsecured network
46. A) To trace the route that data takes to a destination
47. B) Latency
48. B) To direct traffic to a specific server on a private network
49. A) Internet Control Message Protocol
50. B) DSL

51. A) The amount of data that can be transmitted in a given time period
52. A) DHCP
53. C) 255.0.0.0
54. B) Data Link
55. A) Network Address Translation
56. B) MAC address
57. D) Man-in-the-Middle
58. D) Compatibility with IPv4
59. B) To extend the range of a wireless network
60. C) Session
61. C) Unlimited
62. C) Reliable delivery
63. B) Sending data to all devices on a network
64. C) Fiber optic cable
65. B) The actual amount of data transmitted successfully over time
66. A) 24 bits are used for the network part of the address
67. B) ping
68. C) A security device that monitors and controls incoming and outgoing network traffic
69. C) Collision domains are not separated
70. C) Router
71. A) To find the MAC address corresponding to an IP address
72. D) All of the above
73. A) Virtual Local Area Network
74. B) Presentation
75. B) Regular software updates
76. A) 80
77. B) VLAN
78. B) To filter and forward data packets to the correct destination
79. B) SFTP
80. A) To translate IP addresses into domain names
81. B) To forward data packets between different networks
82. C) Equal authority among devices
83. A) Star
84. C) Network
85. C) Router
86. A) Quality of Service
87. C) A record
88. B) Greater bandwidth and speed
89. B) Stateful inspection firewall
90. D) Both B and C

91. C) HTTPS
92. C) The delay before a transfer of data begins
93. B) To request resources
94. A) To define the range of IP addresses in a subnet
95. B) 256.100.50.25
96. B) VPN
97. B) It translates public IP addresses to private IP addresses and vice versa
98. B) 100 meters
99. B) DDoS (Distributed Denial of Service)
100. D) Both A and C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy