Networking MCQ
Networking MCQ
2. Which layer of the OSI model is responsible for error detection and correction?
• A) Physical
• B) Data Link
• C) Network
• D) Application
• A) 192.168.0.1
• B) 8.8.8.8
• C) 172.32.1.1
• D) 10.10.10.10
5. What protocol is used to find the MAC address associated with an IP address?
• A) DNS
• B) ARP
• C) DHCP
• D) ICMP
6. Which of the following protocols operates at the transport layer of the OSI model?
• A) HTTP
• B) TCP
• C) FTP
• D) IP
• A) Hub
• B) Switch
• C) Modem
• D) Repeater
9. In the context of networking, what does NAT stand for?
10. Which layer in the TCP/IP model corresponds to the OSI model's Application, Presentation, and
Session layers?
• A) Transport
• B) Network
• C) Data Link
• D) Application
• A) Fiber optic
• B) Coaxial
• C) Twisted pair
• D) Serial
13. Which protocol is used to securely transfer files over the internet?
• A) FTP
• B) HTTP
• C) SFTP
• D) TFTP
• A) 1.0.0.0 to 127.255.255.255
• B) 128.0.0.0 to 191.255.255.255
• C) 192.0.0.0 to 223.255.255.255
• D) 224.0.0.0 to 239.255.255.255
16. What device would you use to connect a local area network (LAN) to the internet?
• A) Router
• B) Switch
• C) Hub
• D) Access Point
• A) tracert
• B) nslookup
• C) ping
• D) ipconfig
• A) 20
• B) 443
• C) 80
• D) 21
• A) POP3
• B) IMAP
• C) SMTP
• D) HTTP
• A) Transport
• B) Data Link
• C) Network
• D) Application
• A) Broadcast address
• B) Public IP address
• C) Loopback address
• D) Multicast address
24. Which of the following is not a network topology?
• A) Star
• B) Bus
• C) Tree
• D) Modem
26. In which layer of the OSI model does encryption typically occur?
• A) Network
• B) Application
• C) Presentation
• D) Data Link
• A) IPv4
• B) IPv5
• C) IPv6
• D) IPv2
• A) DHCP
• B) DNS
• C) FTP
• D) HTTP
• A) UDP
• B) IP
• C) TCP
• D) ICMP
32. Which of the following is a common protocol used for network management?
• A) SNMP
• B) SSH
• C) SMTP
• D) SFTP
33. What type of attack involves overwhelming a network or service with excessive traffic?
• A) Phishing
• B) DDoS
• C) Man-in-the-Middle
• D) SQL Injection
• A) 10 Mbps
• B) 100 Mbps
• C) 1 Gbps
• D) 10 Gbps
• A) HTTP
• B) FTP
• C) SSH
• D) HTTPS
36. What device is used to connect different network segments and determine the best path for data to
travel?
• A) Hub
• B) Bridge
• C) Router
• D) Switch
• A) WEP
• B) WPA
• C) WPA2
• D) WPA3
39. Which protocol is used to synchronize the time between network devices?
• A) NTP
• B) FTP
• C) TFTP
• D) ICMP
• A) Time to Leave
• B) Time to Live
• C) Transfer to Live
• D) Transmission Time Limit
42. Which protocol is responsible for breaking data into smaller packets and reassembling them at the
destination?
• A) HTTP
• B) IP
• C) TCP
• D) UDP
• A) TCP
• B) IP
• C) HTTP
• D) SMTP
44. Which layer of the OSI model ensures reliable delivery of data?
• A) Network
• B) Transport
• C) Data Link
• D) Physical
47. Which term refers to the delay between a data packet being sent and received?
• A) Bandwidth
• B) Latency
• C) Jitter
• D) Throughput
50. Which technology is used for high-speed internet over traditional telephone lines?
• A) Fiber optics
• B) DSL
• C) Cable
• D) Satellite
• A) DHCP
• B) DNS
• C) ARP
• D) ICMP
• A) 255.255.0.0
• B) 255.255.255.0
• C) 255.0.0.0
• D) 255.255.255.255
54. Which of the following layers in the OSI model is responsible for error detection and correction?
• A) Physical
• B) Data Link
• C) Network
• D) Transport
• A) IP address
• B) MAC address
• C) Domain name
• D) Subnet mask
57. What type of attack intercepts and potentially alters the communication between two parties?
• A) DDoS
• B) Sniffing
• C) Phishing
• D) Man-in-the-Middle
60. Which layer of the OSI model is responsible for establishing, managing, and terminating connections?
• A) Application
• B) Presentation
• C) Session
• D) Transport
61. What is the maximum number of devices that can be connected in a single collision domain?
• A) 10
• B) 100
• C) Unlimited
• D) Depends on the network architecture
• A) Connectionless
• B) No error checking
• C) Reliable delivery
• D) No data segmentation
64. What type of cable is commonly used for high-speed data connections?
• A) Coaxial cable
• B) Twisted pair cable
• C) Fiber optic cable
• D) HDMI cable
67. Which command-line tool can be used to test connectivity to a remote host?
• A) nslookup
• B) ping
• C) netstat
• D) tracert
• A) Increased speed
• B) Increased security
• C) Collision domains are not separated
• D) Easy to manage
• A) Switch
• B) Hub
• C) Router
• D) Bridge
• A) 192.168.1.1
• B) 172.16.0.1
• C) 10.0.0.1
• D) All of the above
74. In the OSI model, which layer is responsible for data encryption?
• A) Application
• B) Presentation
• C) Session
• D) Transport
• A) 80
• B) 443
• C) 21
• D) 25
77. Which technology allows multiple virtual networks to coexist on a single physical network?
• A) NAT
• B) VLAN
• C) VPN
• D) DHCP
• A) FTP
• B) SFTP
• C) HTTP
• D) TFTP
80. What is the primary function of the Domain Name System (DNS)?
• A) Centralized control
• B) Dedicated servers
• C) Equal authority among devices
• D) Limited scalability
83. What type of network topology connects all devices to a single central hub?
• A) Star
• B) Ring
• C) Bus
• D) Mesh
• A) Physical
• B) Data Link
• C) Network
• D) Transport
• A) Hub
• B) Switch
• C) Router
• D) Firewall
• A) Quality of Service
• B) Quantity of Security
• C) Quick Operation System
• D) Query of Sources
87. Which type of DNS record is used to map a domain name to an IP address?
• A) MX record
• B) CNAME record
• C) A record
• D) TXT record
88. What is the main advantage of using fiber optic cables over copper cables?
• A) Lower cost
• B) Greater bandwidth and speed
• C) Easier installation
• D) More flexibility
89. What type of firewall filters traffic based on the state of the connection?
• A) Packet-filtering firewall
• B) Stateful inspection firewall
• C) Proxy firewall
• D) Next-generation firewall
90. Which of the following protocols is used to retrieve email from a mail server?
• A) SMTP
• B) POP3
• C) IMAP
• D) Both B and C
91. Which protocol is used for secure communication over the Internet?
• A) HTTP
• B) FTP
• C) HTTPS
• D) SNMP
• A) To provide resources
• B) To request resources
• C) To manage network traffic
• D) To store data
• A) 192.168.0.1
• B) 256.100.50.25
• C) 10.0.0.5
• D) 172.16.254.1
96. What technology allows remote users to connect to a private network securely?
• A) VLAN
• B) VPN
• C) NAT
• D) ARP
97. Which of the following best describes the function of NAT (Network Address Translation)?
98. What is the maximum length of a Cat 5 Ethernet cable for reliable data transmission?
• A) 50 meters
• B) 100 meters
• C) 200 meters
• D) 500 meters
99. What type of attack involves overwhelming a system with traffic to render it unavailable?
• A) Phishing
• B) DDoS (Distributed Denial of Service)
• C) Man-in-the-Middle
• D) SQL Injection
51. A) The amount of data that can be transmitted in a given time period
52. A) DHCP
53. C) 255.0.0.0
54. B) Data Link
55. A) Network Address Translation
56. B) MAC address
57. D) Man-in-the-Middle
58. D) Compatibility with IPv4
59. B) To extend the range of a wireless network
60. C) Session
61. C) Unlimited
62. C) Reliable delivery
63. B) Sending data to all devices on a network
64. C) Fiber optic cable
65. B) The actual amount of data transmitted successfully over time
66. A) 24 bits are used for the network part of the address
67. B) ping
68. C) A security device that monitors and controls incoming and outgoing network traffic
69. C) Collision domains are not separated
70. C) Router
71. A) To find the MAC address corresponding to an IP address
72. D) All of the above
73. A) Virtual Local Area Network
74. B) Presentation
75. B) Regular software updates
76. A) 80
77. B) VLAN
78. B) To filter and forward data packets to the correct destination
79. B) SFTP
80. A) To translate IP addresses into domain names
81. B) To forward data packets between different networks
82. C) Equal authority among devices
83. A) Star
84. C) Network
85. C) Router
86. A) Quality of Service
87. C) A record
88. B) Greater bandwidth and speed
89. B) Stateful inspection firewall
90. D) Both B and C
91. C) HTTPS
92. C) The delay before a transfer of data begins
93. B) To request resources
94. A) To define the range of IP addresses in a subnet
95. B) 256.100.50.25
96. B) VPN
97. B) It translates public IP addresses to private IP addresses and vice versa
98. B) 100 meters
99. B) DDoS (Distributed Denial of Service)
100. D) Both A and C