Data Communication and Computer Network MCQ Based On Learning Outcome
Data Communication and Computer Network MCQ Based On Learning Outcome
computer networks.
1. Which of the following is NOT a key component of a computer network?
a) Nodes
b) Protocols
c) Modems
d) Routers
2. Which layer of the OSI model is responsible for establishing, managing, and terminating sessions between
applications?
a) Physical layer
b) Data link layer
c) Session layer
d) Transport layer
8. Which network protocol is used for secure transmission of data over the internet?
a) FTP
b) HTTP
c) TCP
d) SSL/TLS
9. Which device is used to connect multiple computers in a local area network (LAN)?
a) Switch
b) Router
c) Modem
d) Hub
11. Which network protocol is commonly used to retrieve emails from a mail server?
a) SMTP
b) POP3
c) FTP
d) HTTP
12. Which type of network cable is commonly used for Ethernet connections?
a) Coaxial cable
b) Fiber optic cable
c) Twisted pair cable
d) HDMI cable
14. Which networking device operates at the data link layer of the OSI model?
a) Switch
b) Router
c) Hub
d) Modem
15. What is the maximum data transfer rate of a USB 3.0 port?
a) 480 Mbps
b) 1 Gbps
c) 5 Gbps
d) 10 Gbps
16. Which wireless networking standard provides the fastest data transfer rates?
a) 802.11a
b) 802.11b
c) 802.11g
d) 802.11ac
17. Which type of network address is used to identify a device within a local network?
a) IP address
b) MAC address
c) URL address
d) Domain name
18. Which network protocol is used to transfer web pages from a server to a client's web browser?
a) HTTP
b) FTP
c) TCP
d) SMTP
19. Which network device operates at the physical layer of the OSI model?
a) Repeater
b) Bridge
c) Switch
d) Router
20. Which technique is used to combine multiple channels into a single high-speed link?
a) Multiplexing
b) Demultiplexing
c) Switching
d) Routing
22. Which protocol is used for secure file transfer over a network?
a) FTP
b) SMTP
c) SSH
d) DNS
23. Which layer of the OSI model is responsible for error detection and retransmission of data?
a) Network layer
b) Transport layer
c) Data link layer
d) Physical layer
2. Which layer of the OSI model is responsible for establishing, managing, and terminating sessions between
applications?
Answer: c) Session layer
Explanation: The session layer of the OSI model is responsible for managing and terminating sessions
between applications. It establishes communication sessions, manages checkpoints, and controls
synchronization between communicating applications.
8. Which network protocol is used for secure transmission of data over the internet?
Answer: d) SSL/TLS (Secure Sockets Layer/Transport Layer Security)
Explanation: SSL/TLS protocols provide secure transmission of data over the internet by encrypting the
data to protect it from unauthorized access and ensuring data integrity during transmission.
9. Which device is used to connect multiple computers in a local area network (LAN)?
Answer: a) Switch
Explanation: A switch is a networking device that connects multiple devices in a local area network (LAN).
It uses MAC addresses to forward data packets between devices within the same network.
11. Which network protocol is commonly used to retrieve emails from a mail server?
Answer: b) POP3 (Post Office Protocol version 3)
Explanation: POP3 is a network protocol commonly used for retrieving emails from a remote mail server.
It allows email clients to download messages from a mail server to the client's device.
12. Which type of network cable is commonly used for Ethernet connections?
Answer: c) Twisted pair cable
Explanation: Twisted pair cables, specifically Cat5e or Cat6 cables, are commonly used for Ethernet
connections. They consist of pairs of twisted copper wires and are capable of transmitting data at high
speeds.
14. Which networking device operates at the data link layer of the OSI model?
Answer: a) Switch
Explanation: A switch operates at the data link layer of the OSI model. It uses MAC addresses to forward
data packets between devices within the same network.
15. What is the maximum data transfer rate of a USB 3.0 port?
Answer: c) 5 Gbps (Gigabits per second)
Explanation: USB 3.0 (SuperSpeed USB) has a maximum data transfer rate of 5 Gbps, which is significantly
faster than the previous USB 2.0 standard.
16. Which wireless networking standard provides the fastest data transfer rates?
Answer: d) 802.11ac
Explanation: Among the given options, 802.11ac provides the fastest data transfer rates. It operates in the
5 GHz frequency band and offers higher speeds compared to previous standards like 802.11a, 802.11b,
and 802.11g.
17. Which type of network address is used to identify a device within a local network?
Answer: b) MAC address
Explanation: MAC (Media Access Control) addresses are used to identify devices within a local network.
They are assigned to network interface cards (NICs) and operate at the data link layer of the OSI model.
18. Which network protocol is used to transfer web pages from a server to a client's web browser?
Answer: a) HTTP (Hypertext Transfer Protocol)
Explanation: HTTP is the network protocol used to transfer web pages from a web server to a client's web
browser. It enables the request and delivery of HTML, images, CSS, and other resources that make up a
webpage.
19. Which network device operates at the physical layer of the OSI model?
Answer: a) Repeater
Explanation: A repeater is a network device that operates at the physical layer of the OSI model. It
amplifies weak signals and extends the reach of a network by regenerating and retransmitting data
signals.
20. Which technique is used to combine multiple channels into a single high-speed link?
Answer: a) Multiplexing
Explanation: Multiplexing is the technique used to combine multiple channels or data streams into a
single high-speed link. It allows multiple signals to share the same physical medium effectively.
22. Which protocol is used for secure file transfer over a network?
Answer: c) SSH (Secure Shell)
Explanation: SSH is a network protocol used for secure file transfer and remote access to devices over a
network. It provides encryption and secure authentication mechanisms for secure communication.
23. Which layer of the OSI model is responsible for error detection and retransmission of data?
Answer: b) Transport layer
Explanation: The transport layer of the OSI model is responsible for error detection, retransmission of lost
data, and ensuring the reliable delivery of data between end systems.
3. Which networking component is responsible for forwarding data packets between different networks?
a) Hub
b) Switch
c) Router
d) Repeater
5. Which layer of the OSI model is responsible for logical addressing and routing in a network?
a) Physical layer
b) Data link layer
c) Network layer
d) Transport layer
6. Which networking device operates at the data link layer of the OSI model and filters network traffic based
on MAC addresses?
a) Router
b) Switch
c) Bridge
d) Gateway
7. What is the purpose of subnetting in networking?
a) Improving network security
b) Increasing data transfer speed
c) Dividing a large network into smaller segments
d) Creating virtual private networks (VPNs)
8. Which protocol is commonly used for securely transferring files between computers in a network?
a) HTTP
b) SMTP
c) FTP
d) DHCP
9. Which type of IP address is used to identify the current network and cannot be assigned to individual
devices?
a) Private IP address
b) Static IP address
c) Dynamic IP address
d) Public IP address
10. Which networking component connects multiple devices in a local area network (LAN) and operates at the
physical layer of the OSI model?
a) Router
b) Hub
c) Switch
d) Bridge
11. What is the primary purpose of the Dynamic Host Configuration Protocol (DHCP) in networking?
a) Resolving domain names to IP addresses
b) Assigning unique MAC addresses to devices
c) Automatically assigning IP addresses to devices on a network
d) Ensuring secure data transmission between devices
12. Which network topology consists of a central node connected to multiple other nodes, forming a star-like
pattern?
a) Bus
b) Ring
c) Star
d) Mesh
15. Which networking component is used to amplify and regenerate data signals, extending the reach of a
network?
a) Switch
b) Bridge
c) Hub
d) Repeater
17. Which network protocol is used for secure web browsing and encrypts data transmission between a web
browser and a web server?
a) HTTP
b) FTP
c) HTTPS
d) POP3
18. Which type of network address is used to uniquely identify a device within a network?
a) IP address
b) MAC address
c) DNS address
d) Subnet mask
19. What is the purpose of VLANs (Virtual Local Area Networks) in networking?
a) Increasing network speed
b) Enhancing network security
c) Segmenting a physical network into multiple virtual networks
d) Enabling wireless connectivity in a LAN
20. Which network protocol is used for translating domain names into IP addresses?
a) SMTP
b) DNS
c) DHCP
d) SNMP
21. Which networking component acts as an intermediary between a client device and a server, forwarding
client requests to the appropriate server?
a) Router
b) Switch
c) Bridge
d) Proxy server
23. Which networking protocol is used for real-time communication, such as voice and video calls, over the
internet?
a) RTP (Real-time Transport Protocol)
b) ICMP (Internet Control Message Protocol)
c) SNMP (Simple Network Management Protocol)
d) RIP (Routing Information Protocol)
24. Which type of network cable is commonly used for high-speed Ethernet connections?
a) Coaxial cable
b) Fiber-optic cable
c) Twisted pair cable
d) HDMI cable
25. What is the purpose of ICMP (Internet Control Message Protocol) in networking?
a) Resolving domain names to IP addresses
b) Assigning IP addresses to devices
c) Facilitating communication between different network protocols
d) Providing error reporting and diagnostic information in IP networks
3. Which networking component is responsible for forwarding data packets between different
networks?
Answer: c) Router
Explanation: Routers are networking devices that operate at the network layer of the OSI model.
They are responsible for forwarding data packets between different networks based on the
destination IP address.
4. What is the function of a Domain Name System (DNS) server in networking?
Answer: b) Translating domain names to IP addresses
Explanation: A DNS server translates domain names (e.g., www.example.com) into their
corresponding IP addresses. It acts as a directory service that allows users to access websites
using human-readable domain names instead of numeric IP addresses.
5. Which layer of the OSI model is responsible for logical addressing and routing in a network?
Answer: c) Network layer
Explanation: The network layer of the OSI model is responsible for logical addressing and routing
in a network. It handles the addressing of data packets and determines the best path for their
delivery to the destination.
6. Which networking device operates at the data link layer of the OSI model and filters network
traffic based on MAC addresses?
Answer: b) Switch
Explanation: Switches are networking devices that operate at the data link layer of the OSI
model. They use MAC addresses to forward network traffic between devices within the same
network, filtering and directing traffic based on the MAC addresses of the devices.
8. Which protocol is commonly used for securely transferring files between computers in a
network?
Answer: c) FTP
Explanation: FTP (File Transfer Protocol) is a standard protocol used for securely transferring files
between computers in a network. It provides mechanisms for authentication, encryption, and
data integrity to ensure secure file transfers.
9. Which type of IP address is used to identify the current network and cannot be assigned to
individual devices?
Answer: a) Private IP address
Explanation: Private IP addresses are used to identify local networks and cannot be assigned to
individual devices directly. They are reserved for internal use within a private network and are
not globally unique.
10. Which networking component connects multiple devices in a local area network (LAN) and
operates at the physical layer of the OSI model?
Answer: c) Switch
Explanation: Switches are networking devices that connect multiple devices in a local area
network (LAN). They operate at the data link layer of the OSI model and facilitate communication
between devices by using MAC addresses.
11. What is the primary purpose of the Dynamic Host Configuration Protocol (DHCP) in networking?
Answer: c) Automatically assigning IP addresses to devices on a network
Explanation: DHCP is a network protocol used to automatically assign IP addresses to devices on
a network. It eliminates the need for manual IP configuration, making it easier to manage large
networks and allowing devices to join a network seamlessly.
12. Which network topology consists of a central node connected to multiple other nodes, forming a
star-like pattern?
Answer: c) Star
Explanation: A star network topology consists of a central node (such as a switch or hub)
connected to multiple other nodes (devices) in a star-like pattern. Each device communicates
directly with the central node, and communication between devices typically requires passing
through the central node.
14. Which protocol is commonly used for sending and receiving emails over a network?
Answer: b) SMTP
Explanation: SMTP (Simple Mail Transfer Protocol) is a widely used protocol for sending and
receiving emails over a network. It defines the rules and procedures for mail exchange between
mail servers and supports the delivery of emails across networks.
15. Which networking component is used to amplify and regenerate data signals, extending the
reach of a network?
Answer: c) Hub
Explanation: A hub is a networking device that operates at the physical layer of the OSI model. It
receives incoming data signals, amplifies them, and regenerates them to extend the reach of the
network. However, hubs are less commonly used today, and switches are preferred for network
connectivity.
17. Which network protocol is used for secure web browsing and encrypts data transmission
between a web browser and a web server?
Answer: c) HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that
encrypts data transmission between a web browser and a web server. It ensures that sensitive
information, such as login credentials or financial data, is transmitted securely over the internet.
18. Which type of network address is used to uniquely identify a device within a network?
Answer: b) MAC address
Explanation: MAC (Media Access Control) addresses are used to uniquely identify network
interface cards (NICs) of devices within a network. They are assigned by the manufacturer and
operate at the data link layer of the OSI model.
19. What is the purpose of VLANs (Virtual Local Area Networks) in networking?
Answer: c) Segmenting a physical network into multiple virtual networks
Explanation: VLANs (Virtual Local Area Networks) are used to segment a physical network into
multiple virtual networks. This segmentation allows for improved network performance,
increased security, and better network management by logically separating devices into distinct
groups.
20. Which network protocol is used for translating domain names into IP addresses?
Answer: b) DNS
Explanation: DNS (Domain Name System) is a network protocol used for translating domain
names into their corresponding IP addresses. It acts as a distributed database that stores and
retrieves IP addresses associated with domain names, allowing users to access websites using
domain names.
21. Which networking component acts as an intermediary between a client device and a server,
forwarding client requests to the appropriate server?
Answer: d) Proxy server
Explanation: A proxy server acts as an intermediary between a client device and a server. It
receives client requests and forwards them to the appropriate server, caching resources, and
providing additional functionality, such as filtering or logging.
23. Which networking protocol is used for real-time communication, such as voice and video calls,
over the internet?
Answer: a) RTP (Real-time Transport Protocol)
Explanation: RTP (Real-time Transport Protocol) is a network protocol used for real-time
communication over the internet. It provides the transport and delivery mechanisms necessary
for transmitting audio, video, and other real-time data streams.
24. Which type of network cable is commonly used for high-speed Ethernet connections?
Answer: c) Twisted pair cable
Explanation: Twisted pair cables are commonly used for high-speed Ethernet connections. They
consist of pairs of insulated copper wires twisted together, providing reliable and cost-effective
transmission of data signals.
25. What is the purpose of ICMP (Internet Control Message Protocol) in networking?
Answer: d) Providing error reporting and diagnostic information in IP networks
Explanation: ICMP (Internet Control Message Protocol) is used to provide error reporting and
diagnostic information in IP networks. It allows devices to send error messages, such as
destination unreachable or time exceeded, and supports network troubleshooting and
diagnostics.
Learning outcome 3 : Understand TCP/IP & OSI Reference Model Understand
1. Which of the following is the primary networking protocol suite used on the internet?
a) TCP/IP
b) HTTP
c) DNS
d) FTP
3. Which layer of the OSI Reference Model is responsible for ensuring error-free transmission of
data between nodes?
a) Network Layer
b) Transport Layer
c) Data Link Layer
d) Physical Layer
4. What is the function of the Transport Layer in the OSI Reference Model?
a) Addressing and routing data packets
b) Establishing connections between devices
c) Encapsulating data into packets
d) Transmitting data over the physical medium
5. Which protocol operates at the Transport Layer of the OSI Reference Model and provides
reliable, connection-oriented data delivery?
a) IP
b) ICMP
c) TCP
d) UDP
6. Which layer of the OSI Reference Model is responsible for translating data formats and providing
encryption and decryption services?
a) Application Layer
b) Presentation Layer
c) Session Layer
d) Transport Layer
8. Which layer of the OSI Reference Model is responsible for logical addressing and routing?
a) Network Layer
b) Data Link Layer
c) Physical Layer
d) Application Layer
9. What is the purpose of the Network Layer in the OSI Reference Model?
a) Ensuring reliable data delivery
b) Establishing end-to-end connections
c) Providing error detection and correction
d) Addressing and routing data packets
10. Which TCP/IP protocol is used for retrieving email from a mail server?
a) SMTP
b) IMAP
c) POP3
d) SNMP
11. Which layer of the OSI Reference Model is responsible for defining the format and structure of
data packets?
a) Data Link Layer
b) Transport Layer
c) Application Layer
d) Presentation Layer
12. Which TCP/IP protocol is used for translating domain names into IP addresses?
a) DNS
b) DHCP
c) ARP
d) ICMP
13. Which layer of the OSI Reference Model is responsible for establishing, managing, and
terminating sessions between applications?
a) Presentation Layer
b) Session Layer
c) Transport Layer
d) Application Layer
14. Which TCP/IP protocol is used for transferring files between computers over a network?
a) FTP
b) HTTP
c) SMTP
d) DNS
15. Which layer of the OSI Reference Model is responsible for providing a user interface and enabling
access to network services?
a) Application Layer
b) Presentation Layer
c) Session Layer
d) Transport Layer
17. Which layer of the OSI Reference Model is responsible for the physical transmission of data bits
over a network medium?
a) Data Link Layer
b) Transport Layer
c) Physical Layer
d) Network Layer
18. Which TCP/IP protocol is used for remote terminal access to a network device?
a) FTP
b) HTTP
c) SSH
d) SMTP
19. Which layer of the OSI Reference Model is responsible for detecting and correcting errors in data
transmission?
a) Transport Layer
b) Data Link Layer
c) Physical Layer
d) Presentation Layer
20. Which TCP/IP protocol is used for automatically assigning IP addresses to devices on a network?
a) DNS
b) DHCP
c) ARP
d) ICMP
21. Which layer of the OSI Reference Model is responsible for ensuring secure data transmission
through encryption and decryption?
a) Presentation Layer
b) Session Layer
c) Transport Layer
d) Application Layer
22. Which TCP/IP protocol is used for remotely managing network devices?
a) FTP
b) HTTP
c) SNMP
d) SMTP
23. Which layer of the OSI Reference Model is responsible for addressing devices on a network using
MAC addresses?
a) Network Layer
b) Data Link Layer
c) Physical Layer
d) Application Layer
24. Which TCP/IP protocol is used for resolving IP addresses to MAC addresses on a local network?
a) DNS
b) DHCP
c) ARP
d) ICMP
25. Which layer of the OSI Reference Model is responsible for providing network services, such as
email, file transfer, and web browsing?
a) Transport Layer
b) Data Link Layer
c) Application Layer
d) Presentation Layer
3. Which layer of the OSI Reference Model is responsible for ensuring error-free transmission of data
between nodes?
Answer: b) Transport Layer
Explanation: The Transport Layer is responsible for ensuring error-free transmission of data between
nodes. It provides mechanisms for segmentation, reliable data delivery, and error detection and
correction.
4. What is the function of the Transport Layer in the OSI Reference Model?
Answer: b) Establishing connections between devices
Explanation: The Transport Layer establishes connections between devices and ensures reliable data
delivery. It provides protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol) for this purpose.
5. Which protocol operates at the Transport Layer of the OSI Reference Model and provides reliable,
connection-oriented data delivery?
Answer: c) TCP
Explanation: TCP (Transmission Control Protocol) operates at the Transport Layer and provides reliable,
connection-oriented data delivery. It guarantees the delivery of data packets in the correct order and
ensures error detection and correction.
6. Which layer of the OSI Reference Model is responsible for translating data formats and providing
encryption and decryption services?
Answer: b) Presentation Layer
Explanation: The Presentation Layer is responsible for translating data formats between applications and
providing encryption and decryption services. It ensures that data from the application layer is properly
formatted for transmission and can be understood by the receiving application.
8. Which layer of the OSI Reference Model is responsible for logical addressing and routing?
Answer: a) Network Layer
Explanation: The Network Layer is responsible for logical addressing and routing. It determines the best
path for data packets to reach their destination using protocols such as IP (Internet Protocol).
9. What is the purpose of the Network Layer in the OSI Reference Model?
Answer: d) Addressing and routing data packets
Explanation: The Network Layer is responsible for addressing and routing data packets. It assigns logical
addresses to devices, such as IP addresses, and determines the best path for data to travel from the
source to the destination.
10. Which TCP/IP protocol is used for retrieving email from a mail server?
Answer: c) POP3
Explanation: POP3 (Post Office Protocol version 3) is a TCP/IP protocol used for retrieving email from a
mail server. It allows users to download their email messages to their local device.
11. Which layer of the OSI Reference Model is responsible for defining the format and structure of data
packets?
Answer: a) Data Link Layer
Explanation: The Data Link Layer is responsible for defining the format and structure of data packets. It
encapsulates data into frames and handles issues such as error detection and flow control.
12. Which TCP/IP protocol is used for translating domain names into IP addresses?
Answer: a) DNS
Explanation: DNS (Domain Name System) is a TCP/IP protocol used for translating domain names into IP
addresses. It resolves human-readable domain names (e.g., www.example.com) to their corresponding IP
addresses.
13. Which layer of the OSI Reference Model is responsible for establishing, managing, and terminating
sessions between applications?
Answer: b) Session Layer
Explanation: The Session Layer is responsible for establishing, managing, and terminating sessions
between applications. It provides services such as session establishment, session maintenance, and
session termination.
14. Which TCP/IP protocol is used for transferring files between computers over a network?
Answer: a) FTP
Explanation: FTP (File Transfer Protocol) is a TCP/IP protocol used for transferring files between
computers over a network. It provides a standard way to access and manage files on remote systems.
15. Which layer of the OSI Reference Model is responsible for providing a user interface and enabling access
to network services?
Answer: a) Application Layer
Explanation: The Application Layer is responsible for providing a user interface and enabling access to
network services. It encompasses applications such as web browsers, email clients, and file transfer
programs.
17. Which layer of the OSI Reference Model is responsible for the physical transmission of data bits over a
network medium?
Answer: c) Physical Layer
Explanation: The Physical Layer is responsible for the physical transmission of data bits over a network
medium. It deals with the electrical, mechanical, and physical aspects of transmitting data.
18. Which TCP/IP protocol is used for remote terminal access to a network device?
Answer: c) SSH
Explanation: SSH (Secure Shell) is a TCP/IP protocol used for secure remote terminal access to a network
device. It provides encryption and authentication for secure communication.
19. Which layer of the OSI Reference Model is responsible for detecting and correcting errors in data
transmission?
Answer: b) Data Link Layer
Explanation: The Data Link Layer is responsible for detecting and correcting errors in data transmission. It
uses techniques such as checksums and error detection codes to ensure data integrity.
20. Which TCP/IP protocol is used for automatically assigning IP addresses to devices on a network?
Answer: b) DHCP
Explanation: DHCP (Dynamic Host Configuration Protocol) is a TCP/IP protocol used for automatically
assigning IP addresses to devices on a network. It simplifies the management of IP addresses in a network
environment.
21. Which layer of the OSI Reference Model is responsible for ensuring secure data transmission through
encryption and decryption?
Answer: a) Presentation Layer
Explanation: The Presentation Layer is responsible for ensuring secure data transmission through
encryption and decryption. It handles encryption, decryption, and data compression.
22. Which TCP/IP protocol is used for remotely managing network devices?
Answer: c) SNMP
Explanation: SNMP (Simple Network Management Protocol) is a TCP/IP protocol used for remotely
managing network devices. It allows network administrators to monitor and control devices on a network.
23. Which layer of the OSI Reference Model is responsible for addressing devices on a network using MAC
addresses?
Answer: b) Data Link Layer
Explanation: The Data Link Layer is responsible for addressing devices on a network using MAC (Media
Access Control) addresses. It provides mechanisms for identifying devices within a local network.
24. Which TCP/IP protocol is used for resolving IP addresses to MAC addresses on a local network?
Answer: c) ARP
Explanation: ARP (Address Resolution Protocol) is a TCP/IP protocol used for resolving IP addresses to
MAC addresses on a local network. It maps IP addresses to their corresponding MAC addresses.
25. Which layer of the OSI Reference Model is responsible for providing network services, such as email, file
transfer, and web browsing?
Answer: c) Application Layer
Explanation: The Application Layer is responsible for providing network services, such as email, file
transfer, and web browsing. It encompasses the protocols and applications that end-users interact with.
2. Which subnet mask corresponds to a network with 12 bits for the network ID and 4 bits for the host ID?
a) 255.255.255.0
b) 255.240.0.0
c) 255.255.240.0
d) 255.0.0.0
3. How many host addresses are available in a network with a subnet mask of 255.255.255.0?
a) 256
b) 512
c) 254
d) 1024
5. What is the maximum number of subnets that can be created using a subnet mask of 255.255.255.192?
a) 4
b) 64
c) 128
d) 256
8. How many bits are reserved for the network ID in a Class A IP address?
a) 8 bits
b) 16 bits
c) 24 bits
d) 32 bits
9. What is the network address for the IP address 192.168.1.100 with a subnet mask of 255.255.255.0?
a) 192.168.1.0
b) 192.168.0.0
c) 192.168.1.100
d) 192.168.1.255
10. What is the broadcast address for the IP address 10.0.0.100 with a subnet mask of 255.255.255.0?
a) 10.0.0.0
b) 10.0.0.255
c) 10.0.0.100
d) 10.0.0.1
11. What is the purpose of Network Address Translation (NAT)?
a) Assign unique IP addresses to devices on a local network
b) Translate domain names to IP addresses
c) Route network traffic between different networks
d) Convert IP addresses to binary format
12. Which protocol is responsible for assigning IP addresses dynamically to devices on a network?
a) TCP
b) DNS
c) DHCP
d) HTTP
2. Which subnet mask corresponds to a network with 12 bits for the network ID and 4 bits for the host ID?
Answer: b) 255.240.0.0
Explanation: In binary, the subnet mask 255.240.0.0 is equivalent to
11111111.11110000.00000000.00000000, which corresponds to 12 bits for the network ID and 4 bits for
the host ID.
3. How many host addresses are available in a network with a subnet mask of 255.255.255.0?
Answer: c) 254
Explanation: In a network with a subnet mask of 255.255.255.0, the last octet is reserved for the host ID.
Since 2^8 (256) addresses are possible in that octet, subtracting 2 for the network and broadcast
addresses leaves 254 available host addresses.
5. What is the maximum number of subnets that can be created using a subnet mask of 255.255.255.192?
Answer: b) 64
Explanation: A subnet mask of 255.255.255.192 (or /26 in CIDR notation) provides 6 bits for the subnet ID,
which allows for 2^6 (64) subnets to be created.
8. How many bits are reserved for the network ID in a Class A IP address?
Answer: a) 8 bits
Explanation: In a Class A IP address, the first octet is reserved for the network ID, which corresponds to 8
bits.
9. What is the network address for the IP address 192.168.1.100 with a subnet mask of 255.255.255.0?
Answer: a) 192.168.1.0
Explanation: The network address is obtained by setting all host bits to zero. In this case, since the subnet
mask is 255.255.255.0, the network address is 192.168.1.0.
10. What is the broadcast address for the IP address 10.0.0.100 with a subnet mask of 255.255.255.0?
Answer: b) 10.0.0.255
Explanation: The broadcast address is obtained by setting all host bits to one. In this case, since the subnet
mask is 255.255.255.0, the broadcast address is 10.0.0.255.
12. Which protocol is responsible for assigning IP addresses dynamically to devices on a network?
Answer: c) DHCP
Explanation: The Dynamic Host Configuration Protocol (DHCP) is responsible for assigning IP addresses
dynamically to devices on a network.