computer networking mcqs
computer networking mcqs
1. Which network topology offers high redundancy by connecting each device to every
other device?
a) Bus
b) Ring
c) Star
d) Mesh
Answer: d) Mesh
3. Which layer of the OSI model is responsible for the physical transmission of data bits?
b) Network Layer
c) Physical Layer
d) Session Layer
a) 3
b) 4
c) 5
d) 7
Answer: b) 4
Network Layering Concepts and Protocols
5. Segmentation of data into packets occurs at which layer of the OSI model?
a) Physical Layer
c) Network Layer
d) Transport Layer
6. Which layer of the OSI model is responsible for establishing, managing, and terminating
connections between applications?
a) Network Layer
b) Transport Layer
c) Session Layer
d) Presentation Layer
c) To encrypt data
a) Application
b) Transport
c) Network
d) Session
Answer: d) Session
Internet Protocol (IP) and Associated Control Protocols (like ICMP)
a) 16 bits
b) 32 bits
c) 64 bits
d) 128 bits
Answer: b) 32 bits
10. What is the purpose of the Time to Live (TTL) field in an IP packet header?
11. Which ICMP message type is used to test the reachability of a host?
a) Echo Reply
b) Destination Unreachable
c) Time Exceeded
d) Echo Request
a) Connectionless
b) Unreliable
d) Low overhead
a) Email (SMTP)
c) Video streaming
b) 48 bits
c) 64 bits
d) 128 bits
a) Host portion
b) Network portion
c) Subnet portion
d) Port number
Answer: b) The address used to send data to all hosts in the network
Channel Access Techniques (likely covering MAC protocols for shared media)
23. Token passing is a channel access method used in which type of network?
a) Ethernet
b) Wi-Fi
c) Token Ring
d) Bluetooth
a) It eliminates collisions.
c) It is simple to implement.
26. What is the standard data rate for Ethernet (IEEE 802.3)?
a) It varies depending on the specific standard (e.g., 10 Mbps, 100 Mbps, 1 Gbps, etc.)
b) 11 Mbps
c) 54 Mbps
d) 600 Mbps
Answer: a) It varies depending on the specific standard (e.g., 10 Mbps, 100 Mbps, 1 Gbps,
etc.)
28. Which wireless security protocol is considered the weakest and is no longer
recommended?
a) WPA3
b) WPA2
c) WPA
d) WEP
Answer: d) WEP
Answer: b) To provide a connection point for wireless devices to the wired network
31. Which type of routing algorithm calculates the entire path to the destination?
b) Link-state routing
c) Path-vector routing
d) Broadcast routing
a) Bandwidth
b) Delay
c) Hop count
d) Cost
a) To terminate a connection
Answer: b) To control the flow of data and prevent overwhelming the receiver
a) Source Port
b) Destination Port
c) Sequence Number
d) Length
a) POST
b) PUT
c) GET
d) DELETE
Answer: c) GET
40. Which FTP mode establishes a separate connection for data transfer?
a) Passive mode
b) Active mode
c) Secure mode
d) Anonymous mode
a) POP3
b) IMAP
c) SMTP
d) HTTP
Answer: c) SMTP
a) MX record
b) CNAME record
c) A record
d) PTR record
Answer: c) A record
a) TCP
b) UDP
c) RTCP
d) HTTP
Answer: c) RTCP
a) Software firewall
b) Hardware firewall
c) Both a and b
d) Neither a nor b
Answer: b) Granting users only the minimum necessary rights and permissions.
b) A buffer zone between the internal network and the external network.
Answer: b) A buffer zone between the internal network and the external network.
Answer: b) To improve network organization and security by isolating parts of the network.
a) It is computationally expensive.
b) Private key
c) Session key
53. What cryptographic hash function property ensures that it’s computationally
infeasible to find two different inputs that produce the same output?
a) Preimage resistance
c) Collision resistance
d) Determinism