0% found this document useful (0 votes)
4 views

quiz on Computer Network All Units

The document consists of a quiz on computer networks, covering fundamental concepts such as network types, protocols, OSI model layers, and network devices. It includes multiple-choice questions that test knowledge on topics like LAN, WAN, TCP/IP protocols, and network troubleshooting. The quiz aims to assess understanding of networking principles and practical applications.

Uploaded by

Mohit shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

quiz on Computer Network All Units

The document consists of a quiz on computer networks, covering fundamental concepts such as network types, protocols, OSI model layers, and network devices. It includes multiple-choice questions that test knowledge on topics like LAN, WAN, TCP/IP protocols, and network troubleshooting. The quiz aims to assess understanding of networking principles and practical applications.

Uploaded by

Mohit shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 68

Unit- 1 Quiz Computer network –Introduction

 What is a computer network?


a) A collection of interconnected devices that communicate with each other
b) A single computer connected to the internet
c) A standalone system without any connection
d) None of the above

 Which of the following is NOT a type of network?


a) LAN
b) WAN
c) PAN
d) CPU

 What is the primary purpose of a network protocol?


a) To design websites
b) To establish communication rules between devices
c) To increase computer speed
d) To store data

 Which device is used to connect multiple computers in a network?


a) Monitor
b) Router
c) Printer
d) Keyboard

 Which of the following is an example of a Wide Area Network (WAN)?


a) Office network
b) Home Wi-Fi
c) The Internet
d) Bluetooth

 A Local Area Network (LAN) typically covers:

a) A single building or campus


b) Multiple cities

c) Entire countries

d) The whole world

 Which topology connects all devices to a central hub?

a) Bus

b) Star

c) Ring

d) Mesh

 In the OSI model, which layer is responsible for data encryption?

a) Physical

b) Data Link

c) Presentation

d) Application

 TCP stands for:

a) Transmission Control Protocol

b) Transfer Control Protocol

c) Transmission Communication Protocol

d) Transfer Communication Protocol

 Which protocol is used for secure communication over the internet?

a) HTTP

b) FTP

c) HTTPS

d) SMTP
 What does IP stand for in IP address?

a) Internet Protocol

b) Internal Protocol

c) Internet Procedure

d) Internal Procedure

 Which device operates at the Data Link layer of the OSI model?

a) Router

b) Switch

c) Hub

d) Repeater

 What is the function of a firewall in a network?

a) To connect multiple networks

b) To prevent unauthorized access

c) To store data

d) To manage IP addresses

 Which protocol is used to send emails?

a) FTP

b) SMTP

c) HTTP

d) SNMP

 What is the default port number for HTTP?

a) 21

b) 25
c) 80

d) 443

 Which layer of the OSI model is responsible for routing?

a) Physical

b) Data Link

c) Network

d) Transport

 What does DNS stand for?

a) Domain Name System

b) Digital Network Service

c) Data Name Server

d) Domain Network Service

 Which protocol is used to transfer files between computers?

a) FTP

b) SMTP

c) SNMP

d) IMAP

 What is the main advantage of fiber optic cables over copper cables?

a) Lower cost

b) Higher bandwidth and speed

c) Easier installation

d) More flexibility

 Which of the following is a private IP address?


a) 192.168.1.1

b) 8.8.8.8

c) 172.217.16.14

d) 203.0.113.1

 In networking, what does VPN stand for?

a) Virtual Private Network

b) Virtual Public Network

c) Variable Private Network

d) Variable Public Network

 Which protocol is used for remote login to a computer?

a) FTP

b) Telnet

c) SMTP

d) SNMP

 What is the purpose of a subnet mask?

a) To identify the network and host portions of an IP address

b) To assign IP addresses dynamically

c) To translate domain names to IP addresses

d) To encrypt data

 Which layer of the OSI model establishes, manages, and terminates connections between
applications?

a) Session

b) Transport

c) Network
d) Data Link

 What does MAC stand for in MAC address?

a) Media Access Control

b) Multiple Access Control

c) Media Application Control

d) Multiple Application Control

 Which protocol is used to retrieve emails from a mail server?

a) SMTP

b) POP3

c) FTP

d) HTTP

 What is the primary function of the Transport layer in the OSI model?

a) Data formatting

b) Data encryption

c) End-to-end communication and error handling

d) Physical addressing

 Which device connects two different networks and directs data packets between them?

a) Switch

b) Router

c) Hub

d) Bridge

 What is the main purpose of the ARP protocol?

a) To map IP addresses to MAC addresses


b) To assign IP addresses dynamically

c) To route data packets

d) To encrypt data

 Which topology involves each device being connected to every other device?

a) Star

b) Bus

c) Ring

d) Mesh

 What is the function of a proxy server?

a) To store data

b) To act as an intermediary between a client and a server

c) To manage IP addresses

d) To encrypt data

 Which protocol is used to dynamically assign IP addresses to devices on a network?

a) DNS

b) DHCP

c) FTP

d) HTTP

 What is the default port number for HTTPS?

a) 21

b) 25

c) 80

d) 443
Q1

What is the fundamental purpose of a computer network?

Sharing resources

Storing data

Performing calculations

Enhancing security

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit
Top of Form

close

Bottom of Form

Report

Q2

Which topology does the Internet resemble?

Ring

Bus

Star

Mesh

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth


Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q3

What type of network covers a large geographical area, like a city, country, or the world?

LAN

MAN

WAN

PAN

View Answer

Report a Problem!

Top of Form

There is an error in the question


Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q4

Which device is used to connect different network segments in a computer network?

Repeater

Router

Bridge

Modem

View Answer
Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q5

What protocol is commonly used for transmitting web pages over the internet?

SMTP

FTP

HTTP
D

SNMP

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q6

Which layer of the OSI model ensures the error-free transmission of data?

Physical Layer

B
Data Link Layer

Network Layer

Transport Layer

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q7

In a computer network, what is the main function of the application layer?


A

To provide network services to the applications

To transmit data between network devices

To package data for transfer

To route data between networks

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form
Report

Q8

Which command can be used to view the current IP configuration of a device?

ipconfig

ifconfig

Both ipconfig and ifconfig

netstat

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit
Top of Form

close

Bottom of Form

Report

Q9

What is the result of executing the ping localhost command?

It sends ICMP echo requests to the local machine

It configures the local machine's IP address

It displays the routing table

It clears the DNS cache

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth


Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q10

If a computer is unable to access the Internet, but can communicate with local network devices,
what should be checked first?

Router configuration

Cable connections

Local firewall settings

DNS settings

View Answer

Report a Problem!

Top of Form

There is an error in the question


Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q11

A computer can ping IP addresses but not domain names.


What is likely the issue?

IP conflict

Router failure

DNS misconfiguration

Faulty Ethernet cable

View Answer
Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q12

Which layer of the OSI model is responsible for establishing, managing, and terminating
sessions between applications?

Session Layer

Transport Layer

C
Application Layer

Presentation Layer

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q13

What is the primary function of the Network Layer in the OSI model?

To provide data routing paths for network communication


B

To format data

To establish connections

To encode and decode data

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q14
In the TCP/IP model, which layer corresponds to the OSI model's Physical and Data Link layers?

Application

Transport

Internet

Network Interface

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close
Bottom of Form

Report

Q15

The process of encapsulation involves data moving from which layer to which layer?

Application to Physical

Physical to Application

Transport to Network

Network to Transport

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form
CancelSubmit

Top of Form

close

Bottom of Form

Report

Q16

Which OSI layer is responsible for error detection and correction at the destination?

Transport

Network

Data Link

Physical

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth


Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q17

What does the TCP/IP model's Internet layer do?

Manages end-to-end data communication sessions

Routes packets across networks

Formats data packets

Encodes and decodes data

View Answer

Report a Problem!

Top of Form

There is an error in the question


Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q18

Which protocol operates at the Transport Layer of the OSI model to ensure reliable
communication?

ICMP

IP

TCP

UDP

View Answer
Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q19

How does the Presentation Layer of the OSI model differ from the Application Layer?

It is responsible for session management

It deals with syntax and semantics of the information exchanged

It provides encryption and compression


D

It is not implemented in the TCP/IP model

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q20

What feature distinguishes TCP from UDP at the Transport Layer?

TCP is faster than UDP

B
TCP and UDP use different port numbers

TCP is connection-oriented while UDP is not

TCP uses IP but UDP does not

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q21

Which command can be used to display the current TCP/IP network configuration?
A

ipconfig /all

netstat -r

arp -a

tracert

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form
Report

Q22

What does the netstat command do?

Displays network connections, routing tables, and statistics

Configures network interfaces

Tests connectivity to a host

Manages firewall settings

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit
Top of Form

close

Bottom of Form

Report

Q23

Which command is used to test connectivity to a specific IP address and trace the path the
packets take?

ping

arp

tracert

nslookup

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth


Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q24

A device is unable to connect to any network. Which OSI layer should be investigated first?

Application

Presentation

Network

Physical

View Answer

Report a Problem!

Top of Form

There is an error in the question


Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q25

If a computer can connect to local devices but not to the Internet, what might be misconfigured?

IP address

Subnet mask

Default gateway

MAC address

View Answer
Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q26

A web application can send data but cannot receive.


What layer could be malfunctioning?

Application

Session

C
Transport

Presentation

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q27

What is the primary function of the MAC (Media Access Control) sublayer?

Frame delimiting
B

Error detection

Controlling access to the physical medium

Physical addressing

View Answer

Report a Problem!

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Comment

Bottom of Form

CancelSubmit

Top of Form

close

Bottom of Form

Report

Q28
What is the standard Ethernet frame size for most networks?

64 bytes to 1518 bytes

128 bytes to 1024 bytes

1500 bytes to 2000 bytes

100 bytes to 1500 bytes

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Q29

In Ethernet networks, what is the purpose of the collision detection mechanism?

To encrypt data

To compress data

C
To detect and manage when two devices try to send data simultaneously

To prioritize data

Top of Form

There is an error in the question

Answer seems to be wrong

Explanation is not understandable

Explanation lacks depth

Q30

Which Ethernet standard provides a speed of 1 Gbps?

10BaseT

100BaseTX

1000BaseT

10GBaseT

 Which protocol is used to retrieve emails from a mail server?


 a) SMTP
 b) POP3
 c) FTP
 d) HTTP

 What is the primary function of the Transport layer in the OSI model?

 a) Data formatting
 b) Data encryption
 c) End-to-end communication and error handling
 d) Physical addressing

 Which device connects two different networks and directs data packets between them?

 a) Switch
 b) Router
 c) Hub
 d) Bridge

 What is the main purpose of the ARP protocol?

 a) To map IP addresses to MAC addresses


 b) To assign IP addresses dynamically
 c) To route data packets
 d) To encrypt data

 Which topology involves each device being connected to every other device?

 a) Star
 b) Bus
 c) Ring
 d) Mesh

 What is the function of a proxy server?

 a) To store data
 b) To act as an intermediary between a client and a server
 c) To manage IP addresses
 d) To encrypt data

 Which protocol is used to dynamically assign IP addresses to devices on a network?

 a) DNS
 b) DHCP
 c) FTP
 d) HTTP
 What is the default port number for HTTPS?

 a) 21
 b) 25
 c) 80
 d) 443

 Which layer of the OSI model is responsible for error detection and correction?

 a) Physical
 b) Data Link
 c) Network
 d) Transport

 What does NAT stand for in networking?

 a) Network Address Translation


 b) Network Access Transmission
 c) Network Application Testing
 d) Network Address Transmission

 Which protocol is used to securely transfer files over a network?

 a) FTP
 b) SFTP
 c) HTTP
 d) SMTP

 In IPv4 addressing, how many bits are used for an IP address?

 a) 32
 b) 64
 c) 128
 d) 256

 Which device operates at the Physical layer of the OSI model?

 a) Router
 b) Switch
 c) Hub
 d) Bridge

 What is the main function of the Network layer in the OSI model?

 a) Data encryption
 b) Path determination and logical addressing
 c) Physical addressing
 d) Data formatting

 Which protocol is used for network device management and monitoring?

 a) SNMP
 b) SMTP
 c) FTP
 d) HTTP

 What is the purpose of the ICMP protocol?

 a) To transfer files
 b) To send error messages and operational information
 c) To manage email transmission
 d) To encrypt data

 Which of the following is a connection-oriented protocol?

 a) UDP
 b) TCP
 c) IP
 d) ICMP

 What does SSL stand for?

 a) Secure Socket Layer


 b) Secure System Layer
 c) System Socket Layer
 d) Secure Service Layer

 Which protocol is commonly used for voice and video transmission over IP networks?

 a) FTP
 b) RTP
 c) HTTP
 d) SMTP

 What is the primary purpose of a VLAN?

 a) To increase network speed


 b) To segment a network into logical groups
 c) To connect different networks
 d) To encrypt data

 Which layer of the OSI model is responsible for data compression?


 a) Physical
 b) Data Link
 c) Presentation
 d) Application

 What is the function of a gateway in a network?

 a) To connect networks using different protocols


 b) To amplify signals
 c) To filter traffic
 d) To store data

 Which protocol is used to resolve IP addresses to domain names?

 a) DNS
 b) DHCP
 c) ARP
 d) FTP

 What is the maximum length of a CAT5e Ethernet cable segment?

 a) 50 meters
 b) 100 meters
 c) 150 meters
 d) 200 meters

 Which of the following is a class A IP address?

 a) 192.168.1.1
 b) 172.16.0.1
 c) 10.0.0.1
 d) 224.0.0.1

 What does MTU stand for in networking?

 a) Maximum Transmission Unit


 b) Minimum Transmission Unit
 c) Medium Transmission Unit
 d) Maximum Transfer Unit

 Which protocol is used for remote desktop access?

 a) FTP
 b) RDP
 c) SMTP
 d) SNMP
 What is the primary function of a load balancer in a network?

 a) To distribute incoming network traffic across multiple servers


 b) To store data
 c) To encrypt data
 d) To monitor network performance

 Which layer of the OSI model handles flow control?

 a) Physical
 b) Data Link
 c) Network
 d) Transport

 What is the purpose of a demilitarized zone (DMZ) in network security?

 a) To encrypt data
 b) To separate an internal network from untrusted external networks
 c) To store data
 d) To manage IP addresses

 Which protocol is used to synchronize time across devices on a network?

 a) FTP
 b) NTP
 c) SMTP
 d) SNMP

 What is the default port number for Telnet?

 a) 21
 b) 22
 c) 23
 d) 25
Unit- 1 Quiz Computer network –physical layer

 The Physical Layer is primarily concerned with:

 a) Application-to-application communication
 b) Process-to-process communication
 c) Bit-by-bit delivery
 d) Frame-to-frame delivery

 Which transmission medium offers the highest data transmission speed?

 a) Coaxial cable
 b) Twisted pair cable
 c) Optical fiber
 d) Wireless

 In the OSI model, the Physical Layer is responsible for:

 a) Error detection and correction


 b) Routing and forwarding
 c) Defining hardware specifications
 d) Session management

 Which of the following is NOT a function of the Physical Layer?

 a) Bit synchronization
 b) Circuit switching
 c) Packet sequencing
 d) Modulation

 The term "baud rate" refers to:

 a) The number of bits transmitted per second


 b) The number of signal units transmitted per second
 c) The frequency of the signal
 d) The bandwidth of the channel

 Which device operates solely at the Physical Layer?


 a) Router
 b) Switch
 c) Hub
 d) Bridge

 The Physical Layer deals with the transmission of:

 a) Frames
 b) Packets
 c) Bits
 d) Segments

 Which of the following is a characteristic of UTP (Unshielded Twisted Pair) cables?

 a) High immunity to electromagnetic interference


 b) Consists of a single solid wire
 c) Contains multiple twisted pairs without shielding
 d) Utilizes light for data transmission

 In fiber optic communication, the core of the fiber is made of:

 a) Copper
 b) Plastic or glass
 c) Aluminum
 d) Steel

 The process of converting digital signals into analog signals for transmission over analog
mediums is called:

 a) Demodulation
 b) Multiplexing
 c) Modulation
 d) Encoding

 Which of the following connectors is commonly used with coaxial cables?

 a) RJ45
 b) BNC
 c) SC
 d) LC

 The maximum length of a standard Ethernet (10Base-T) cable segment is:

 a) 50 meters
 b) 100 meters
 c) 200 meters
 d) 500 meters

 Which modulation technique involves varying the amplitude of the carrier signal?

 a) Frequency Modulation (FM)


 b) Phase Modulation (PM)
 c) Amplitude Modulation (AM)
 d) Quadrature Amplitude Modulation (QAM)

 In wireless communication, the term "attenuation" refers to:

 a) The increase in signal strength


 b) The delay of signal transmission
 c) The reduction in signal strength
 d) The reflection of signals

 Which of the following is a type of guided transmission medium?

 a) Microwave
 b) Satellite
 c) Optical fiber
 d) Radio wave

 The Physical Layer provides services to which layer of the OSI model?

 a) Data Link Layer


 b) Network Layer
 c) Transport Layer
 d) Application Layer

 In the context of the Physical Layer, "throughput" refers to:

 a) The time taken for a signal to travel from sender to receiver


 b) The number of bits transmitted successfully per unit time
 c) The delay between data transmission and reception
 d) The error rate of the transmission

 Which of the following is NOT a standard for wireless communication?

 a) IEEE 802.3
 b) IEEE 802.11
 c) Bluetooth
 d) Zigbee

 The term "full-duplex" in data transmission means:


 a) Data can only be transmitted in one direction
 b) Data transmission is alternated between two directions
 c) Data can be transmitted in both directions simultaneously
 d) Multiple devices share the same transmission medium

 Which of the following encoding schemes uses two voltage levels to represent binary 0
and 1, with no neutral or zero voltage level?

 a) Non-Return to Zero (NRZ)


 b) Manchester Encoding
 c) Bipolar Encoding
 d) Differential Manchester Encoding

 In the context of the Physical Layer, "bandwidth" refers to:

 a) The range of frequencies that a transmission medium can carry


 b) The amount of data that can be stored
 c) The delay in data transmission
 d) The error rate of the transmission

 Which of the following is a disadvantage of using coaxial cables?

 a) High susceptibility to electromagnetic interference


 b) Limited bandwidth compared to twisted pair cables
 c) Bulkiness and difficulty in installation
 d) High cost compared to optical fibers

 The term "latency" in network communication refers to:

 a) The amount of data transmitted per second


 b) The time delay between the transmission and reception of a signal
 c) The strength of the transmitted signal
 d) The error rate in data transmission

 Which of the following devices is used to regenerate and amplify signals in a network to
extend the transmission distance?

 a) Router
 b) Switch
 c) Repeater
 d) Gateway

 In the OSI model, which layer is responsible for converting data into electrical, optical,
or radio signals?

 a) Data Link Layer


 b) Network Layer
 c) Transport Layer
 d) Physical Layer

 Which type of multiplexing allows multiple analog signals to be combined into one
signal over a shared medium?

 a) Time Division Multiplexing (TDM)


 b) Frequency Division Multiplexing (FDM)
 c) Code Division Multiplexing (CDM)
 d) Space Division Multiplexing (SDM)

Unit-3 Quiz Computer network –Network Layer

 The primary responsibility of the Network Layer is:

 a) Data encryption and decryption


 b) End-to-end communication and error correction
 c) Routing packets from the source to the destination across multiple networks
 d) Managing hardware addresses and error detection

 Which protocol operates at the Network Layer of the OSI model?

 a) Transmission Control Protocol (TCP)


 b) Internet Protocol (IP)
 c) User Datagram Protocol (UDP)
 d) Hypertext Transfer Protocol (HTTP)

 In the OSI model, the Network Layer is which layer?

 a) Second
 b) Third
 c) Fourth
 d) Fifth

 The process of determining the best path for data to travel from source to destination is
known as:

 a) Switching
 b) Routing
 c) Bridging
 d) Filtering

 Which of the following is NOT a function of the Network Layer?

 a) Path determination
 b) Logical addressing
 c) Error detection and correction
 d) Packet forwarding

 The protocol responsible for mapping IP addresses to MAC addresses is:

 a) Address Resolution Protocol (ARP)


 b) Internet Control Message Protocol (ICMP)
 c) Dynamic Host Configuration Protocol (DHCP)
 d) Domain Name System (DNS)

 Which routing algorithm uses the Bellman-Ford algorithm to calculate paths?

 a) Link State Routing


 b) Distance Vector Routing
 c) Path Vector Routing
 d) Hybrid Routing

 In IPv4 addressing, a subnet mask of 255.255.255.0 indicates how many possible host
addresses?

 a) 254
 b) 256
 c) 510
 d) 512

 The protocol used to report errors and operational information in an IP network is:

 a) Internet Control Message Protocol (ICMP)


 b) Transmission Control Protocol (TCP)
 c) User Datagram Protocol (UDP)
 d) Simple Network Management Protocol (SNMP)
 Which of the following is a characteristic of the IPv6 protocol?

 a) 32-bit address space


 b) Fragmentation performed by both sender and routers
 c) No checksum field in the header
 d) Broadcast addressing

 The process of dividing an IP address space into smaller segments is known as:

 a) Supernetting
 b) Subnetting
 c) Multicasting
 d) Broadcasting

 Which protocol is used to dynamically assign IP addresses to hosts in a network?

 a) Domain Name System (DNS)


 b) Dynamic Host Configuration Protocol (DHCP)
 c) Address Resolution Protocol (ARP)
 d) Internet Control Message Protocol (ICMP)

 In the context of routing, what does the term "convergence" refer to?

 a) The time it takes for a router to forward a packet


 b) The process of routers updating their routing tables and reaching a consistent state
 c) The method of combining multiple routes into one
 d) The technique of reducing routing loops

 Which of the following is a distance-vector routing protocol?

 a) Open Shortest Path First (OSPF)


 b) Border Gateway Protocol (BGP)
 c) Routing Information Protocol (RIP)
 d) Intermediate System to Intermediate System (IS-IS)

 The term "MTU" stands for:

 a) Maximum Transmission Unit


 b) Minimum Transmission Unit
 c) Maximum Transfer Utility
 d) Minimum Transfer Utility

 In IPv4, the loopback address is:

 a) 127.0.0.1
 b) 192.168.0.1
 c) 10.0.0.1
 d) 169.254.0.1

 Which field in the IPv4 header is used to prevent packets from looping indefinitely?

 a) Time to Live (TTL)


 b) Header Checksum
 c) Protocol
 d) Fragment Offset

 The process of aggregating multiple IP networks into a single advertisement is known


as:

 a) Subnetting
 b) Supernetting
 c) Multicasting
 d) Anycasting

 Which of the following is a link-state routing protocol?

 a) Routing Information Protocol (RIP)


 b) Open Shortest Path First (OSPF)
 c) Border Gateway Protocol (BGP)
 d) Exterior Gateway Protocol (EGP)

 In IPv6, the address ::1 is equivalent to which IPv4 address?

 a) 0.0.0.0
 b) 127.0.0.1
 c) 192.168.1.1
 d) 255.255.255.255

 The protocol that provides a virtual circuit service at the Network Layer is:

 a) Transmission Control Protocol (TCP)


 b) User Datagram Protocol (UDP)
 c) Internet Protocol (IP)
 d) X.25

 Which of the following IP address classes provides a maximum of 254 host addresses
per network ID?

 a) Class A
 b) Class B
 c) Class C
 d) Class D
 The process of determining which path a packet should take through a network is
called:

 a) Switching
 b) Routing
 c) Bridging
 d) Filtering

 In the context of IP addressing, CIDR stands for:

 a) Classless Inter-Domain Routing


 b) Classful Internet Domain Routing
 c) Connectionless Internet Datagram Routing
 d) Connection-Oriented Inter-Domain Routing

 Which protocol is used to discover the MAC address of a host given its IP address?

 a) Address Resolution Protocol (ARP)


 b) Reverse Address Resolution Protocol (RARP)
 c) Internet Control Message Protocol (ICMP)
 d) Dynamic Host Configuration Protocol (DHCP)

 The primary purpose of the Network Layer is to:

 a) Provide error-free delivery of data


 b) Establish, manage, and terminate sessions
 c) Move packets from the source to the destination
 d) Format data for presentation

 The Data Link Layer of the OSI model is responsible for:

 a) Routing packets between devices


 b) Establishing, maintaining, and terminating sessions
 c) Node-to-node data transfer and error detection
 d) Application-to-application communication
 Which of the following is a sublayer of the Data Link Layer?

 a) Network Control Protocol


 b) Logical Link Control
 c) Transmission Control Protocol
 d) User Datagram Protocol

 The process of dividing a data stream into smaller units called frames is known as:

 a) Segmentation
 b) Packetizing
 c) Framing
 d) Encapsulation

 Which protocol is used for error detection by adding a trailer to the frame?

 a) Cyclic Redundancy Check (CRC)


 b) Internet Control Message Protocol (ICMP)
 c) Address Resolution Protocol (ARP)
 d) Dynamic Host Configuration Protocol (DHCP)

 In the Data Link Layer, flow control is achieved using:

 a) Sliding window protocol


 b) Routing algorithms
 c) Encryption techniques
 d) Domain Name System (DNS)

 Which of the following is NOT a function of the Data Link Layer?

 a) Error detection and correction


 b) Flow control
 c) Path determination
 d) Frame synchronization

 The MAC (Media Access Control) address is used to:

 a) Identify devices at the Network Layer


 b) Identify devices at the Data Link Layer
 c) Identify devices at the Transport Layer
 d) Identify devices at the Application Layer

 Which of the following is a Data Link Layer protocol?

 a) Ethernet
 b) IP
 c) TCP
 d) HTTP

 In a token ring network, the token passing mechanism is used to:

 a) Detect errors in frames


 b) Control access to the shared medium
 c) Route packets between networks
 d) Encrypt data for security

 The Point-to-Point Protocol (PPP) operates at which layer of the OSI model?

 a) Physical Layer
 b) Data Link Layer
 c) Network Layer
 d) Transport Layer

 Which error detection method involves adding parity bits to data?

 a) Checksum
 b) Cyclic Redundancy Check (CRC)
 c) Parity Check
 d) Hamming Code

 In the context of the Data Link Layer, ARQ stands for:

 a) Automatic Repeat Query


 b) Automatic Routing Query
 c) Asynchronous Repeat Query
 d) Asynchronous Routing Query

 Which of the following is a flow control protocol used in the Data Link Layer?

 a) Stop-and-Wait
 b) Distance Vector Routing
 c) Link State Routing
 d) Open Shortest Path First (OSPF)

 The High-Level Data Link Control (HDLC) protocol is an example of:

 a) A connectionless protocol
 b) A connection-oriented protocol
 c) A routing protocol
 d) An application layer protocol

 In Ethernet networks, the CSMA/CD protocol is used to:


 a) Detect and correct errors in frames
 b) Control access to the shared medium
 c) Route packets between networks
 d) Encrypt data for security

 Which of the following is a characteristic of the Logical Link Control (LLC) sublayer?

 a) Provides MAC addressing


 b) Manages protocol multiplexing
 c) Handles physical signaling
 d) Controls access to the transmission medium

 The process of adding headers and trailers to data is known as:

 a) Encapsulation
 b) Decapsulation
 c) Fragmentation
 d) Segmentation

 In the context of the Data Link Layer, FCS stands for:

 a) Frame Control Sequence


 b) Frame Check Sequence
 c) Flow Control Sequence
 d) File Control Sequence

 Which of the following is an example of a Data Link Layer device?

 a) Router
 b) Switch
 c) Hub
 d) Repeater

 The term "bit stuffing" refers to:

 a) Adding extra bits to data to ensure proper framing


 b) Removing erroneous bits from data
 c) Compressing data to save bandwidth
 d) Encrypting data for security

 In a sliding window protocol, the window size refers to:

 a) The number of bits transmitted per second


 b) The number of frames that can be sent without acknowledgment
 c) The size of each frame in bytes
 d) The time interval between frame transmissions
 Which of the following is a method of error correction used in the Data Link Layer?

 a) Parity Check
 b) Checksum
 c) Hamming Code
 d) Cyclic Redundancy Check (CRC)

 The Address Resolution Protocol (ARP) is used to:

 a) Map IP addresses to MAC addresses


 b) Map MAC addresses to IP addresses
 c) Resolve domain names to IP addresses
 d) Resolve IP addresses to domain names

 In the context of Ethernet, a collision domain is:

 a) A network segment where data packets can collide


 b) A network segment where broadcasts are propagated
 c) A network segment isolated by routers
 d) A network segment isolated by switches

 Which of the following is a characteristic of the MAC sublayer?

 a) Provides error detection and correction


 b) Manages logical addressing
 c) Controls access to the physical transmission medium
 d) Establishes end-to-end connections

 In a wireless network, the Data Link Layer uses which protocol for media access
control?

 a) CSMA/CD
 b) CSMA/CA
 c) Token Passing
 d) Polling
Unit- 4 Quiz Computer network- Transport
Layer

 The primary function of the Transport Layer is to:

 a) Route data packets between devices


 b) Provide end-to-end communication and error control
 c) Manage hardware addressing
 d) Handle physical signal transmission

 Which of the following protocols operates at the Transport Layer?

 a) Internet Protocol (IP)


 b) Transmission Control Protocol (TCP)
 c) Address Resolution Protocol (ARP)
 d) Internet Control Message Protocol (ICMP)

 The Transport Layer is which layer in the OSI model?

 a) Third
 b) Fourth
 c) Fifth
 d) Sixth

 Which Transport Layer protocol provides a connection-oriented service?

 a) User Datagram Protocol (UDP)


 b) Transmission Control Protocol (TCP)
 c) Internet Protocol (IP)
 d) Hypertext Transfer Protocol (HTTP)

 The process of combining data from multiple applications into a single stream is known
as:

 a) Demultiplexing
 b) Multiplexing
 c) Encapsulation
 d) Segmentation

 In TCP, the three-way handshake is used to:

 a) Terminate a connection
 b) Establish a connection
 c) Flow control
 d) Error detection

 Which field in the TCP header is used for flow control?

 a) Sequence Number
 b) Acknowledgment Number
 c) Window Size
 d) Urgent Pointer

 UDP is considered a connectionless protocol because:

 a) It establishes a connection before data transfer


 b) It does not guarantee delivery of data
 c) It provides error correction
 d) It uses a three-way handshake

 The term "port number" in the Transport Layer is used to:

 a) Identify the physical port on a device


 b) Specify the process or service on the destination device
 c) Indicate the IP address of a device
 d) Determine the MAC address of a device

 Which of the following is a well-known port number for HTTP?

 a) 20
 b) 21
 c) 80
 d) 443

 In TCP, the mechanism used to control congestion is known as:

 a) Flow control
 b) Error control
 c) Congestion control
 d) Multiplexing

 The UDP header includes which of the following fields?

 a) Sequence Number
 b) Acknowledgment Number
 c) Checksum
 d) Window Size
 Which of the following applications would most likely use UDP?

 a) File Transfer Protocol (FTP)


 b) Email (SMTP)
 c) Video streaming
 d) Web browsing (HTTP)

 In the context of TCP, what does MSS stand for?

 a) Maximum Segment Size


 b) Minimum Segment Size
 c) Maximum Service Size
 d) Minimum Service Size

 The process of dividing a message into smaller units for transmission is called:

 a) Encapsulation
 b) Segmentation
 c) Multiplexing
 d) Demultiplexing

 Which Transport Layer protocol provides error detection but not error correction?

 a) TCP
 b) UDP
 c) IP
 d) ICMP

 In TCP, the term "window size" refers to:

 a) The size of the data packet


 b) The amount of data that can be sent without acknowledgment
 c) The size of the header
 d) The number of simultaneous connections

 The term "socket" in networking refers to:

 a) A physical connector
 b) A combination of IP address and port number
 c) A type of firewall
 d) A network protocol

 Which of the following is NOT a feature of TCP?

 a) Connection-oriented communication
 b) Flow control
 c) Congestion control
 d) Broadcast transmission

 In the context of TCP, the "urgent pointer" field is used to:

 a) Indicate the end of the data stream


 b) Prioritize certain data
 c) Acknowledge received data
 d) Control the flow of data

 Which protocol provides a connectionless service at the Transport Layer?

 a) TCP
 b) UDP
 c) IP
 d) ICMP

 The term "handshake" in networking refers to:

 a) The process of terminating a connection


 b) The process of establishing a connection
 c) Data encryption
 d) Error detection

 In TCP, the "sequence number" field is used to:

 a) Identify the port number


 b) Indicate the order of data bytes
 c) Specify the IP address
 d) Determine the window size

 Which of the following is a characteristic of UDP?

 a) Guaranteed delivery
 b) Connection-oriented
 c) Low overhead
 d) Flow control

 The "checksum" field in the Transport Layer is used for:

 a) Flow control
 b) Error detection
 c) Congestion control
 d) Data encryption

 In TCP, the "FIN" flag is used to:


 a) Establish a connection
 b) Terminate a connection
 c) Synchronize sequence numbers
 d) Indicate urgent data

 Which of the following protocols is used for reliable data transfer?

 a) UDP
 b) TCP
 c) IP
 d) ICMP

 The "ACK" flag in the TCP header indicates:

 a) Acknowledgment of received data


 b) Request for connection termination
 c) Synchronization of sequence numbers
 d) Presence of urgent data

 In the context of TCP, "flow control" is achieved using:

 a) Sequence numbers
 b) Acknowledgments
 c) Window size
 d) Checksum

50 mcq Quiz Computer network – Application Layer

 Which of the following is an Application Layer protocol?

 a) IP
 b) TCP
 c) HTTP
 d) Ethernet

 The primary function of the Application Layer is to:


 a) Provide end-to-end communication
 b) Facilitate user interaction with network services
 c) Route data packets between devices
 d) Manage physical transmission of data

 Which protocol is used for transferring files over the Internet?

 a) SMTP
 b) FTP
 c) DNS
 d) SNMP

 The Domain Name System (DNS) translates:

 a) IP addresses to domain names


 b) Domain names to IP addresses
 c) MAC addresses to IP addresses
 d) IP addresses to MAC addresses

 Which of the following protocols is used for sending and receiving email?

 a) HTTP
 b) FTP
 c) SMTP
 d) SNMP

 The Hypertext Transfer Protocol (HTTP) operates over which port number?

 a) 21
 b) 22
 c) 80
 d) 443

 Which protocol is used for secure communication over the Internet?

 a) HTTP
 b) HTTPS
 c) FTP
 d) SMTP

 The Simple Mail Transfer Protocol (SMTP) operates over which port number?

 a) 21
 b) 22
 c) 25
 d) 110
 Which of the following is a connectionless protocol at the Application Layer?

 a) FTP
 b) HTTP
 c) DNS
 d) SMTP

 The File Transfer Protocol (FTP) operates over which port numbers?

 a) 20 and 21
 b) 21 and 22
 c) 22 and 23
 d) 23 and 25

 Which protocol is used for remote login to another computer?

 a) FTP
 b) Telnet
 c) SMTP
 d) SNMP

 The Simple Network Management Protocol (SNMP) is used for:

 a) Managing network devices


 b) Transferring files
 c) Sending emails
 d) Resolving domain names

 Which of the following protocols is used for secure email communication?

 a) SMTP
 b) POP3
 c) IMAP
 d) S/MIME

 The Hypertext Transfer Protocol Secure (HTTPS) operates over which port number?

 a) 80
 b) 443
 c) 21
 d) 22

 Which protocol is used for retrieving email from a server?

 a) SMTP
 b) POP3
 c) IMAP
 d) SNMP

 The Internet Message Access Protocol (IMAP) allows:

 a) Sending emails
 b) Retrieving emails
 c) Managing network devices
 d) Resolving domain names

 Which of the following is a stateful protocol?

 a) HTTP
 b) FTP
 c) DNS
 d) SMTP

 The Dynamic Host Configuration Protocol (DHCP) is used for:

 a) Assigning IP addresses to devices


 b) Resolving domain names
 c) Managing network devices
 d) Sending emails

 Which protocol is used for network time synchronization?

 a) SNMP
 b) NTP
 c) FTP
 d) SMTP

 The Telnet protocol operates over which port number?

 a) 21
 b) 22
 c) 23
 d) 25

 Which of the following protocols is used for secure remote login?

 a) Telnet
 b) SSH
 c) FTP
 d) SMTP

 The Simple Network Management Protocol (SNMP) operates over which port number?
 a) 161
 b) 162
 c) 80
 d) 443

 Which protocol is used for sending and receiving instant messages?

 a) SMTP
 b) XMPP
 c) FTP
 d) SNMP

 The Post Office Protocol version 3 (POP3) operates over which port number?

 a) 21
 b) 22
 c) 23
 d) 110

 Which protocol is used for transferring hypertext documents over the Internet?

 a) FTP
 b) HTTP
 c) SMTP
 d) SNMP

 The Internet Control Message Protocol (ICMP) is used for:

 a) Sending emails
 b) Managing network devices
 c) Error reporting and diagnostics
 d) Resolving domain names

 Which protocol is used for secure file transfer over the Internet?

 a) FTP
 b) SFTP
 c) SMTP
 d) SNMP

 The Domain Name System (DNS) operates over which port number?

 a) 53
 b) 80
 c) 443
 d) 21
 Which protocol is used for sending and receiving emails with attachments?

 a) SMTP
 b) POP3
 c) IMAP
 d) MIME

 The Hypertext Transfer Protocol (HTTP) operates over which port number?

 a) 21
 b) 22
 c) 23
 d) 80

 Which protocol is used for secure email communication?

 a) SMTP
 b) POP3
 c) IMAP
 d) S/MIME

 The Simple Mail Transfer Protocol (SMTP) operates over which port number?

 a) 21
 b) 22
 c) 25
 d) 110

 Which protocol is used for transferring files over the Internet?

 a) SMTP
 b) FTP
 c) DNS
 d) SNMP

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy