0% found this document useful (0 votes)
70 views15 pages

MCQs With Ans

The document contains a multiple choice quiz about computer networking concepts. It includes 50 questions about topics like network topologies, networking devices, protocols, and network security.

Uploaded by

anujamcanaac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views15 pages

MCQs With Ans

The document contains a multiple choice quiz about computer networking concepts. It includes 50 questions about topics like network topologies, networking devices, protocols, and network security.

Uploaded by

anujamcanaac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

MCQ

1. What do users often use to access mainframe or supercomputer?

a. terminal

b. node

c. Desktop

d. handheld

Ans. A-Terminal

2. Which of the following exchanges information between computing devices?

a. Peripheral

b. expansion board

c. digital device

d. network

Ans. D-Network

3.In which network topology the components are connected by a single cable?

a. Bus Topology

b. Ring Topology

c. Star Topology

d. Mesh Topology

Ans. A – Bus Topology

4. What is made to share information between two or more computers?

a. router

b. Server
c. network

d. software

Ans. C – network
5. Which of the following is a small-single site network?

a. WAN (Wide Area Network)

b. LAN (Local Area Network)

c. MAN(Metropolitan Area Network)

d. RAM (Random Access Memory)

Ans. B – LAN (Local Area Network)

6. Through which network is information exchanged geographically in computers?

a. WAN

b. LAN

c. MAN

d. all of these

Ans. A – WAN

7. Computers connected to a local area network (LAN)

a. walk fast

b. can go online

c. can email

d. Can share information or peripheral devices

Ans. D – Can share information or peripheral devices


8. What is considered the world’s first computer network?

a. Internet

b. NSF Net

c. ARPANET

d. VNet

Ans. C – ARPANET

9. When many computers have to be connected at one place, what is it called?

a. WAN

b. INFINITE

c. WON (Wireless Optical Network)

d. LAN

Ans. D – LAN

10. ____ is a central computer that holds a collection of data and programs for many
personal computers, work stations, and other computers?

a. super computer

b. mini computer

c. laptop

d. Server

Ans. D – Server

MCQ on Computer Network:


11. Which of the following is a small network?

a. LAN
b. M.A.N.

c. WAN

d. RAM

Ans. A – LAN

12. What is the name of the network topology in which every possible node has a
bidirectional link?

a. ring topology

b. star topology

c. bus topology

d. mesh topology

Ans. D – mesh topology

13. What is the device called which connects to the network without cable?

a. distributed

b. Wireless

c. centralized

d. Open Source

Ans. B – Wireless

14. What is Protocol?

a. a set of rules

b. example of input device

c. a part of the cpu

d. compiler
Ans. A – a set of rules

15. What is a terminal?

a. A device that supplies power to a computer

b. A point at which data enters or leaves a computer

c. last instruction of a program

d. none of these

Ans. B – A point at which data enters or leaves a computer


16. Office LANs which are geographically dispersed can be connected using corporate
____?

a. WAN (Wide Area Network)

b. DAN (Desk Area Network)

c. CAN (Campus Area Network)

d. MAN(Metropolitan Area Network)

Ans. A – WAN (Wide Area Network)

17. What does LAN mean in networking?

a. Local Area Network

b. Long Access Network

c. Large Area Network

d. Local Access Node

Answer: a. Local Area Network

18. Which of the following protocols is used to send and receive email messages?

a. http
b. ftp

c. POP3

d. TCP

Answer: c. POP3

19. What is the purpose of IP Address in networking?

a. To identify a device on a network

b. To encrypt data transmissions

c. To manage network security

d. To establish VPN connections

Answer: a. To identify a device on a network

20. Which network topology forms a closed-loop where each device is connected to
exactly two other devices?

a. Star Topology

b. Bus Topology

c. Ring Topology

d. Mesh Topology

Answer: c. Ring Topology

21. Which protocol is used to retrieve email messages from a mail server to a client
computer?

a. smtp

b. http

c. IMAP

d. ftp
Answer: c. IMAP
22. What does DNS resolve in networking?

a. Domain names to IP addresses

b. IP addresses to domain names

c. Encrypted data transmissions

d. Network security issues

Answer: a. Domain names to IP addresses

23. Which layer of the OSI model is responsible for data compression and
decompression?

a. Physical Layer

b. Data Link Layer

c. Presentation Layer

d. Transport Layer

Answer: c. Presentation Layer

24. What is the function of router in network?

a. To connect devices within a LAN

b. To connect a LAN to the Internet

c. To switch data packets within a LAN

d. To filter network traffic

Answer: b. To connect a LAN to the Internet

MCQ on Computer Network:


25. Which protocol is used to securely transfer files between a local computer and a
remote server?

a. http

b. ftp

c. smtp

d. POP3

Answer: b. ftp

26. Which of the following devices works on the Physical Layer (Layer 1) of the OSI
model?

a. Router

b. hub

c. switch

d. Firewall

Answer: b. hub

27. What is the primary function of ARP (Address Resolution Protocol) in networking?

a. To map IP addresses to MAC addresses

b. To route packets across networks

c. To establish secure VPN connections

d. To regulate network traffic flow

Answer: a. To map IP addresses to MAC addresses

28. Which networking component is responsible for connecting the local network to the
Internet?

a. Modem
b. Router

c. Firewall

d. switch

Answer: b. Router

29. What is the purpose of subnet mask in IP networking?

a. To hide the IP address of a device

b. To determine the network portion of an IP address

c. To encrypt network traffic

d. To assign IP addresses dynamically

Answer: b. To determine the network portion of an IP address

30. What is the maximum number of IP addresses in an IPv4 subnet with a subnet mask
of 255.255.255.240?

a. 4

b. 8

c. 16

d. 32

Answer: c. 16
31. Which protocol is responsible for sending email over the Internet?

a. ftp

b. http

c. smtp

d. POP3
Answer: c. smtp

32. What is the purpose of firewall in network security?

a. To encrypt data transmissions

b. To filter and control network traffic

c. To resolve domain names to IP addresses

d. To establish VPN connections

Answer: b. To filter and control network traffic

33. What does ICMP mean in networking?

a. Internet Control Message Protocol

b. Internet Communication and Mapping Protocol

c. Internet Configuration Management Protocol

d. Internet Connection Monitoring Protocol

Answer: a. Internet Control Message Protocol

34. Which network topology connects all devices to a central hub or switch?

a. Ring Topology

b. Mesh Topology

c. Star Topology

d. Bus Topology

Answer: c. Star Topology


35. What is the purpose of VPN (Virtual Private Network) in networking?

a. To broadcast network traffic to all devices on a subnet.


b. To create a secure, encrypted connection over the Internet.

c. To filter and control network traffic

d. To map domain names to IP addresses

Answer: b. To create a secure, encrypted connection over the Internet.

36. Which port number is usually associated with HTTPS (Hypertext Transfer Protocol
Secure) protocol?

a. 80

b. 443

c. 25

d. 53

Answer: b. 443

MCQ on Computer Network:


37. What is the purpose of QoS (Quality of Service) in networking?

a. To secure network communications

b. To prioritize and manage network traffic

c. To resolve domain names to IP addresses

d. To establish VPN connections

Answer: b. To prioritize and manage network traffic

38. Which of the following is a private IP address?

a. 192.168.1.1

b. 203.129.22.15

c. 172.16.32.8
d. 209.143.58.7

Answer: a. 192.168.1.1

39. What is the maximum theoretical data transfer rate of a Gigabit Ethernet
connection?

a. 100Mbps

b. 1Gbps

c. 10Gbps

d. 100Gbps

Answer: b. 1Gbps
40. Which OSI Model Layer is responsible for ensuring that data is delivered reliably and
in the correct order?

a. Physical Layer

b. Data Link Layer

c. Transport Layer

d. Network Layer

Answer: c. Transport Layer

41. What is VLAN (Virtual Local Area Network)?

a. A physical network segment

b. A wireless access point

c. A logical network segment within a physical network

d. A network switch

Answer: c. A logical network segment within a physical network


42. Which protocol is used for secure file transfer over the network?

a. http

b. ftp

c. smtp

d. ICMP

Answer: b. ftp

43. What is the primary function of proxy server in networking?

a. To filter and control network traffic

b. To map domain names to IP addresses

c. To establish secure VPN connections

d. To encrypt data transmissions

Answer: a. To filter and control network traffic

44. Which of the following is not a top-level domain (TLD) in DNS (Domain Name
System)?

a. .com

b. .org

c. .net

d. .html

Answer: d. .html
45. What is the purpose of NAT (Network Address Translation) in a home router?

a. To assign IP addresses to devices dynamically

b. To hide internal IP addresses from external networks


c. To encrypt network traffic

d. To filter and control network traffic

Answer: b. To hide internal IP addresses from external networks

46. What is MAC Address in networking?

a. The physical address of a network device

b. The IP address of a network device

c. The URL of a website

d. The email address of a user

Answer: a. The physical address of a network device

47. What is the primary function of a DNS server?

a. To filter and control network traffic

b. To assign IP addresses to devices dynamically

c. To map domain names to IP addresses

d. To establish secure VPN connections

Answer: c. To map domain names to IP addresses

48. In wireless networks, which technology is used to secure and encrypt data
transmission?

a. WEP (Wired Equivalent Privacy)

b. FTP (File Transfer Protocol)

c. HTTPS (Hypertext Transfer Protocol Secure)

d. WPA2 (Wi-Fi Protected Access 2)

Answer: d. WPA2 (Wi-Fi Protected Access 2)


49. What is the purpose of ICMP Destination Unreachable message in networking?

a. To indicate that a host or network is unreachable.

b. To acknowledge the receipt of a TCP packet

c. To request an IP address from a DHCP server

d. To establish a secure VPN connection

Answer: a. To indicate that a host or network is unreachable.

50. What is the primary purpose of BGP (Border Gateway Protocol) in the context of
Internet?

a. To secure network communications

b. To map domain names to IP addresses

c. To route traffic between autonomous systems (ASes)

d. To prioritize network traffic

Answer: c. To route traffic between autonomous systems (ASes)

You might also like