Networking Mcqs
Networking Mcqs
a) To play games
b) To share resources and information
c) To browse the internet
d) To make phone calls
Answer: b) To share resources and information
2. Which device is used to connect multiple computers in a
network?
a) Printer
b) Router
c) Monitor
d) Keyboard
Answer: b) Router
3. Which of the following is an example of a network
protocol?
a) HTTP
b) HTML
c) JPG
d) CSS
Answer: a) HTTP
4. What is the primary function of a firewall in a network?
a) To provide internet access
b) To block unauthorized access
c) To increase network speed
d) To store data
Answer: b) To block unauthorized access
5. In networking, what does "LAN" stand for?
a) Large Area Network
b) Local Area Network
c) Long Area Network
d) Light Area Network
Answer: b) Local Area Network
6. Which network topology has a central hub and all nodes
are connected to this hub?
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology
Answer: c) Star topology
7. What is a characteristic of a bus topology?
a) All devices are connected in a circle
b) All devices are connected to a single central cable
c) All devices are connected to a central hub
d) All devices are connected to each other
Answer: b) All devices are connected to a single central
cable
8. In the OSI model, which layer is responsible for data
encryption and decryption?
a) Physical layer
b) Data link layer
c) Network layer
d) Presentation layer
Answer: d) Presentation layer
9. Which layer of the OSI model is responsible for routing?
a) Application layer
b) Transport layer
c) Network layer
d) Session layer
Answer: c) Network layer
10. The TCP/IP model consists of how many layers?
a) 3
b) 4
c) 5
d) 7
Answer: b) 4
11. What does "HTTP" stand for?
a) HyperText Transfer Protocol
b) HyperText Transmission Protocol
c) HighText Transfer Protocol
d) HighText Transmission Protocol
Answer: a) HyperText Transfer Protocol
12. Which protocol is used for secure communication over
the internet?
a) HTTP
b) FTP
c) SSH
d) Telnet
Answer: c) SSH
13. What is the port number for HTTPS?
a) 20
b) 21
c) 80
d) 443
Answer: d) 443
14. Which protocol is used to send emails?
a) SMTP
b) SNMP
c) FTP
d) HTTP
Answer: a) SMTP
15. Which protocol is used to receive emails from a server?
a) SMTP
b) POP3
c) FTP
d) HTTP
Answer: b) POP3
16. Which device operates at the Data Link layer of the OSI
model?
a) Router
b) Switch
c) Hub
d) Repeater
Answer: b) Switch
17. What is the function of a router in a network?
a) To store data
b) To repeat signals
c) To route data packets between networks
d) To connect devices within a network
Answer: c) To route data packets between networks
18. Which device is used to extend the range of a network
by amplifying the signal?
a) Switch
b) Hub
c) Repeater
d) Router
Answer: c) Repeater
19. Which device can filter and forward traffic based on
MAC addresses?
a) Router
b) Switch
c) Hub
d) Firewall
Answer: b) Switch
20. What is the purpose of a network hub?
a) To filter traffic
b) To route traffic
c) To amplify signals
d) To connect multiple Ethernet devices
Answer: d) To connect multiple Ethernet devices
21. What is the default subnet mask for a Class C IP
address?
a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
Answer: c) 255.255.255.0
22. How many host addresses are available in a Class C
subnet?
a) 256
b) 254
c) 512
d) 1024
Answer: b) 254
23. What is the binary representation of the IP address
192.168.1.1?
a) 11000000.10101000.00000001.00000001
b) 11000000.10011000.00000001.00000001
c) 11000001.10101000.00000001.00000001
d) 11000000.10101000.00000001.00000010
Answer: a) 11000000.10101000.00000001.00000001
24. Which of the following is a private IP address?
a) 8.8.8.8
b) 192.168.0.1
c) 172.56.34.5
d) 203.120.45.67
Answer: b) 192.168.0.1
25. What is the purpose of subnetting?
a) To increase the number of IP addresses
b) To reduce the size of broadcast domains
c) To connect different networks
d) To speed up network traffic
Answer: b) To reduce the size of broadcast domains
26. What does VPN stand for?
a) Virtual Private Network
b) Virtual Public Network
c) Virtual Protected Network
d) Virtual Partitioned Network
Answer: a) Virtual Private Network
27. Which security protocol is commonly used for wireless
networks?
a) WEP
b) WPA2
c) SSL
d) HTTPS
Answer: b) WPA2
28. What is the main purpose of network encryption?
a) To speed up data transmission
b) To compress data
c) To prevent unauthorized access
d) To increase network range
Answer: c) To prevent unauthorized access
29. What does IDS stand for in network security?
a) Internet Detection System
b) Intrusion Detection System
c) Internal Detection System
d) Information Detection System
Answer: b) Intrusion Detection System
30. Which type of malware disguises itself as legitimate
software?
a) Virus
b) Worm
c) Trojan
d) Spyware
Answer: c) Trojan
31. Which technology is used for creating virtual networks
within a physical network?
a) VPN
b) VLAN
c) WEP
d) SSL
Answer: b) VLAN
32. What does NAT stand for?
a) Network Address Translation
b) Network Access Technology
c) Network Address Technology
d) Network Access Translation
Answer: a) Network Address Translation
33. What is the main function of a DNS server?
a) To assign IP addresses
b) To resolve domain names to IP addresses
c) To route traffic
d) To provide encryption
Answer: b) To resolve domain names to IP addresses
34. Which protocol is used for transferring files over the
internet?
a) SMTP
b) FTP
c) HTTP
d) SNMP
Answer: b) FTP
35. In which layer of the OSI model does the IP protocol
operate?
a) Physical layer
b) Data link layer
c) Network layer
d) Transport layer
Answer: c) Network layer
Wireless Networking
36. What is the maximum data rate for 802.11n Wi-Fi?
a) 54 Mbps
b) 150 Mbps
c) 300 Mbps
d) 600 Mbps
Answer: d) 600 Mbps
37. Which frequency band is used by 802.11ac Wi-Fi?
a) 2.4 GHz
b) 5 GHz
c) 900 MHz
d) 1.2 GHz
Answer: b) 5 GHz
38. What does SSID stand for in wireless networking?
a) Secure Set Identification
b) Service Set Identification
c) Secure Service Identifier
d) Service Secure Identification
Answer: b) Service Set Identification
39. What is the main advantage of using a 5 GHz Wi-Fi
band over a 2.4 GHz band?
a) Longer range
b) Better penetration through walls
c) Less interference
d) Higher security
Answer: c) Less
40. Which wireless encryption standard is considered most
secure?
a) WEP
b) WPA
c) WPA2
d) WPS
Answer: c) WPA2
41. What does SNMP stand for?
a) Simple Network Management Protocol
b) Secure Network Management Protocol
c) Simple Network Management Process
d) Secure Network Management Process
Answer: a) Simple Network Management Protocol
42. Which protocol is used to monitor network devices?
a) SNMP
b) SMTP
c) FTP
d) HTTP
Answer: a) SNMP
43. What is the purpose of a network management system
(NMS)?
a) To increase network speed
b) To manage and monitor network devices
c) To provide encryption
d) To connect devices
Answer: b) To manage and monitor network devices
44. Which type of address is used in SNMP to identify
devices?
a) MAC address
b) IP address
c) OID
d) URL
Answer: c) OID
45. Which tool can be used to capture and analyze
network traffic?
a) Wireshark
b) PuTTY
c) FileZilla
d) Thunderbird
Answer: a) Wireshark
Network Troubleshooting
46. What is the command to check the reachability of a
host on a network?
a) ipconfig
b) netstat
c) ping
d) tracert
Answer: c) ping
47. Which command displays all active network
connections on a Windows system?
a) ipconfig
b) netstat
c) ping
d) tracert
Answer: b) netstat
48. What does the command "ipconfig /release" do?
a) Displays the IP configuration
b) Releases the current DHCP lease
c) Renews the DHCP lease
d) Clears the DNS cache
Answer: b) Releases the current DHCP lease
49. Which tool can be used to trace the path of packets to
a destination?
a) ipconfig
b) netstat
c) ping
d) tracert
Answer: d) tracert
50. What is the purpose of the "nslookup" command?
a) To display IP configuration
b) To manage network connections
c) To query DNS servers
d) To trace packet routes
Answer: c) To query DNS servers