0% found this document useful (0 votes)
132 views120 pages

Networking Mcqs

networking mcqs

Uploaded by

svsrrecruit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views120 pages

Networking Mcqs

networking mcqs

Uploaded by

svsrrecruit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 120

1. What is the main purpose of a computer network?

a) To play games
b) To share resources and information
c) To browse the internet
d) To make phone calls
Answer: b) To share resources and information
2. Which device is used to connect multiple computers in a
network?
a) Printer
b) Router
c) Monitor
d) Keyboard
Answer: b) Router
3. Which of the following is an example of a network
protocol?
a) HTTP
b) HTML
c) JPG
d) CSS
Answer: a) HTTP
4. What is the primary function of a firewall in a network?
a) To provide internet access
b) To block unauthorized access
c) To increase network speed
d) To store data
Answer: b) To block unauthorized access
5. In networking, what does "LAN" stand for?
a) Large Area Network
b) Local Area Network
c) Long Area Network
d) Light Area Network
Answer: b) Local Area Network
6. Which network topology has a central hub and all nodes
are connected to this hub?
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology
Answer: c) Star topology
7. What is a characteristic of a bus topology?
a) All devices are connected in a circle
b) All devices are connected to a single central cable
c) All devices are connected to a central hub
d) All devices are connected to each other
Answer: b) All devices are connected to a single central
cable
8. In the OSI model, which layer is responsible for data
encryption and decryption?
a) Physical layer
b) Data link layer
c) Network layer
d) Presentation layer
Answer: d) Presentation layer
9. Which layer of the OSI model is responsible for routing?
a) Application layer
b) Transport layer
c) Network layer
d) Session layer
Answer: c) Network layer
10. The TCP/IP model consists of how many layers?
a) 3
b) 4
c) 5
d) 7
Answer: b) 4
11. What does "HTTP" stand for?
a) HyperText Transfer Protocol
b) HyperText Transmission Protocol
c) HighText Transfer Protocol
d) HighText Transmission Protocol
Answer: a) HyperText Transfer Protocol
12. Which protocol is used for secure communication over
the internet?
a) HTTP
b) FTP
c) SSH
d) Telnet
Answer: c) SSH
13. What is the port number for HTTPS?
a) 20
b) 21
c) 80
d) 443
Answer: d) 443
14. Which protocol is used to send emails?
a) SMTP
b) SNMP
c) FTP
d) HTTP
Answer: a) SMTP
15. Which protocol is used to receive emails from a server?
a) SMTP
b) POP3
c) FTP
d) HTTP
Answer: b) POP3
16. Which device operates at the Data Link layer of the OSI
model?
a) Router
b) Switch
c) Hub
d) Repeater
Answer: b) Switch
17. What is the function of a router in a network?
a) To store data
b) To repeat signals
c) To route data packets between networks
d) To connect devices within a network
Answer: c) To route data packets between networks
18. Which device is used to extend the range of a network
by amplifying the signal?
a) Switch
b) Hub
c) Repeater
d) Router
Answer: c) Repeater
19. Which device can filter and forward traffic based on
MAC addresses?
a) Router
b) Switch
c) Hub
d) Firewall
Answer: b) Switch
20. What is the purpose of a network hub?
a) To filter traffic
b) To route traffic
c) To amplify signals
d) To connect multiple Ethernet devices
Answer: d) To connect multiple Ethernet devices
21. What is the default subnet mask for a Class C IP
address?
a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
Answer: c) 255.255.255.0
22. How many host addresses are available in a Class C
subnet?
a) 256
b) 254
c) 512
d) 1024
Answer: b) 254
23. What is the binary representation of the IP address
192.168.1.1?
a) 11000000.10101000.00000001.00000001
b) 11000000.10011000.00000001.00000001
c) 11000001.10101000.00000001.00000001
d) 11000000.10101000.00000001.00000010
Answer: a) 11000000.10101000.00000001.00000001
24. Which of the following is a private IP address?
a) 8.8.8.8
b) 192.168.0.1
c) 172.56.34.5
d) 203.120.45.67
Answer: b) 192.168.0.1
25. What is the purpose of subnetting?
a) To increase the number of IP addresses
b) To reduce the size of broadcast domains
c) To connect different networks
d) To speed up network traffic
Answer: b) To reduce the size of broadcast domains
26. What does VPN stand for?
a) Virtual Private Network
b) Virtual Public Network
c) Virtual Protected Network
d) Virtual Partitioned Network
Answer: a) Virtual Private Network
27. Which security protocol is commonly used for wireless
networks?
a) WEP
b) WPA2
c) SSL
d) HTTPS
Answer: b) WPA2
28. What is the main purpose of network encryption?
a) To speed up data transmission
b) To compress data
c) To prevent unauthorized access
d) To increase network range
Answer: c) To prevent unauthorized access
29. What does IDS stand for in network security?
a) Internet Detection System
b) Intrusion Detection System
c) Internal Detection System
d) Information Detection System
Answer: b) Intrusion Detection System
30. Which type of malware disguises itself as legitimate
software?
a) Virus
b) Worm
c) Trojan
d) Spyware
Answer: c) Trojan
31. Which technology is used for creating virtual networks
within a physical network?
a) VPN
b) VLAN
c) WEP
d) SSL
Answer: b) VLAN
32. What does NAT stand for?
a) Network Address Translation
b) Network Access Technology
c) Network Address Technology
d) Network Access Translation
Answer: a) Network Address Translation
33. What is the main function of a DNS server?
a) To assign IP addresses
b) To resolve domain names to IP addresses
c) To route traffic
d) To provide encryption
Answer: b) To resolve domain names to IP addresses
34. Which protocol is used for transferring files over the
internet?
a) SMTP
b) FTP
c) HTTP
d) SNMP
Answer: b) FTP
35. In which layer of the OSI model does the IP protocol
operate?
a) Physical layer
b) Data link layer
c) Network layer
d) Transport layer
Answer: c) Network layer

Wireless Networking
36. What is the maximum data rate for 802.11n Wi-Fi?
a) 54 Mbps
b) 150 Mbps
c) 300 Mbps
d) 600 Mbps
Answer: d) 600 Mbps
37. Which frequency band is used by 802.11ac Wi-Fi?
a) 2.4 GHz
b) 5 GHz
c) 900 MHz
d) 1.2 GHz
Answer: b) 5 GHz
38. What does SSID stand for in wireless networking?
a) Secure Set Identification
b) Service Set Identification
c) Secure Service Identifier
d) Service Secure Identification
Answer: b) Service Set Identification
39. What is the main advantage of using a 5 GHz Wi-Fi
band over a 2.4 GHz band?
a) Longer range
b) Better penetration through walls
c) Less interference
d) Higher security
Answer: c) Less
40. Which wireless encryption standard is considered most
secure?
a) WEP
b) WPA
c) WPA2
d) WPS
Answer: c) WPA2
41. What does SNMP stand for?
a) Simple Network Management Protocol
b) Secure Network Management Protocol
c) Simple Network Management Process
d) Secure Network Management Process
Answer: a) Simple Network Management Protocol
42. Which protocol is used to monitor network devices?
a) SNMP
b) SMTP
c) FTP
d) HTTP
Answer: a) SNMP
43. What is the purpose of a network management system
(NMS)?
a) To increase network speed
b) To manage and monitor network devices
c) To provide encryption
d) To connect devices
Answer: b) To manage and monitor network devices
44. Which type of address is used in SNMP to identify
devices?
a) MAC address
b) IP address
c) OID
d) URL
Answer: c) OID
45. Which tool can be used to capture and analyze
network traffic?
a) Wireshark
b) PuTTY
c) FileZilla
d) Thunderbird
Answer: a) Wireshark

Network Troubleshooting
46. What is the command to check the reachability of a
host on a network?
a) ipconfig
b) netstat
c) ping
d) tracert
Answer: c) ping
47. Which command displays all active network
connections on a Windows system?
a) ipconfig
b) netstat
c) ping
d) tracert
Answer: b) netstat
48. What does the command "ipconfig /release" do?
a) Displays the IP configuration
b) Releases the current DHCP lease
c) Renews the DHCP lease
d) Clears the DNS cache
Answer: b) Releases the current DHCP lease
49. Which tool can be used to trace the path of packets to
a destination?
a) ipconfig
b) netstat
c) ping
d) tracert
Answer: d) tracert
50. What is the purpose of the "nslookup" command?
a) To display IP configuration
b) To manage network connections
c) To query DNS servers
d) To trace packet routes
Answer: c) To query DNS servers

More Networking Basics


51. What is the function of DHCP in a network?
a) To translate domain names to IP addresses
b) To assign IP addresses dynamically
c) To encrypt data
d) To monitor network traffic
Answer: b) To assign IP addresses dynamically
52. What is the standard port number for HTTP?
a) 20
b) 21
c) 80
d) 110
Answer: c) 80
53. Which OSI layer is responsible for establishing,
managing, and terminating connections?
a) Application layer
b) Transport layer
c) Session layer
d) Network layer
Answer: c) Session layer
54. What is the main function of the transport layer in the
OSI model?
a) To route data packets
b) To provide end-to-end communication
c) To format data
d) To encrypt data
Answer: b) To provide end-to-end communication
55. Which of the following is a characteristic of a ring
topology?
a) All devices are connected to a central hub
b) All devices are connected to a single central cable
c) All devices are connected in a circle
d) All devices are connected to each other
Answer: c) All devices are connected in a circle

Network Protocols Continued


56. Which protocol is used for remote terminal access?
a) HTTP
b) FTP
c) Telnet
d) SMTP
Answer: c) Telnet
57. What does the "IP" in "IP address" stand for?
a) Internet Protocol
b) Internal Protocol
c) Interface Protocol
d) Interconnected Protocol
Answer: a) Internet Protocol
58. Which protocol is used for error reporting and
diagnostic functions in IP networks?
a) TCP
b) UDP
c) ICMP
d) ARP
Answer: c) ICMP
59. What is the main difference between TCP and UDP?
a) TCP is connection-oriented, UDP is connectionless
b) TCP is faster than UDP
c) TCP is used for streaming, UDP is used for emails
d) TCP is a layer 3 protocol, UDP is a layer 4 protocol
Answer: a) TCP is connection-oriented, UDP is
connectionless
60. Which protocol is used to automatically assign IP
addresses in a network?
a) DNS
b) DHCP
c) FTP
d) SNMP
Answer: b) DHCP
61. What is the main function of a bridge in a network?
a) To amplify signals
b) To route traffic
c) To connect different network segments
d) To provide wireless access
Answer: c) To connect different network segments
62. Which device operates at both the Data Link and
Network layers of the OSI model?
a) Router
b) Switch
c) Hub
d) Bridge
Answer: a) Router
63. What is a wireless access point?
a) A device that connects wireless clients to a wired
network
b) A device that routes traffic between networks
c) A device that stores data
d) A device that amplifies signals
Answer: a) A device that connects wireless clients to a
wired network
64. Which device can create VLANs?
a) Router
b) Hub
c) Switch
d) Repeater
Answer: c) Switch
65. What is the main purpose of a modem in a network?
a) To route traffic
b) To convert digital signals to analog and vice versa
c) To connect devices
d) To store data
Answer: b) To convert digital signals to analog and vice
versa
66. What is the range of a Class A IP address?
a) 0.0.0.0 to 127.255.255.255
b) 128.0.0.0 to 191.255.255.255
c) 192.0.0.0 to 223.255.255.255
d) 224.0.0.0 to 239.255.255.255
Answer: a) 0.0.0.0 to 127.255.255.255
67. What is the CIDR notation for a subnet mask of
255.255.255.0?
a) /16
b) /24
c) /8
d) /32
Answer: b) /24
68. How many bits are there in an IPv6 address?
a) 32
b) 64
c) 128
d) 256
Answer: c) 128
69. Which of the following is an example of an IPv6
address?
a) 192.168.0.1
b) 172.16.0.1
c) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
d) 10.0.0.1
Answer: c) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
70. What is the default gateway in a network?
a) The DNS server address
b) The IP address of the router
c) The IP address of the switch
d) The IP address of the firewall
Answer: b) The IP address of the router
71. What is a DMZ in network security?
a) Demilitarized Zone
b) Domain Management Zone
c) Data Management Zone
d) Digital Management Zone
Answer: a) Demilitarized Zone
72. What is the purpose of a proxy server?
a) To encrypt data
b) To cache web content and filter requests
c) To connect devices
d) To route traffic
Answer: b) To cache web content and filter requests
73. Which protocol is used to secure HTTP traffic?
a) FTP
b) SSH
c) HTTPS
d) Telnet
Answer: c) HTTPS
74. What is a DDoS attack?
a) Data Denial of Service
b) Distributed Denial of Service
c) Domain Denial of Service
d) Direct Denial of Service
Answer: b) Distributed Denial of Service
75. Which tool can be used to perform a security audit on
a network?
a) Wireshark
b) Nmap
c) FileZilla
d) PuTTY
Answer: b) Nmap
76. What does MPLS stand for?
a) Multi-Protocol Label Switching
b) Multi-Protocol Link Switching
c) Multi-Path Label Switching
d) Multi-Path Link Switching
Answer: a) Multi-Protocol Label Switching
77. Which technology allows multiple

VLANs to be transmitted over a single link?


a) VPN
b) NAT
c) Trunking
d) Bridging
Answer: c) Trunking
78. What is QoS in networking?
a) Quality of Signal
b) Quality of Service
c) Quality of Security
d) Quality of Speed
Answer: b) Quality of Service
79. What does BGP stand for in networking?
a) Border Gateway Protocol
b) Basic Gateway Protocol
c) Base Gateway Protocol
d) Backup Gateway Protocol
Answer: a) Border Gateway Protocol
80. Which protocol is used for dynamic routing within an
Autonomous System (AS)?
a) OSPF
b) BGP
c) RIP
d) EIGRP
Answer: a) OSPF
81. What is the maximum data rate for 802.11ac Wi-Fi?
a) 300 Mbps
b) 600 Mbps
c) 1 Gbps
d) 3.47 Gbps
Answer: d) 3.47 Gbps
82. Which wireless standard is known as WiGig?
a) 802.11n
b) 802.11ac
c) 802.11ad
d) 802.11ax
Answer: c) 802.11ad
83. What frequency does 802.11ad Wi-Fi use?
a) 2.4 GHz
b) 5 GHz
c) 60 GHz
d) 900 MHz
Answer: c) 60 GHz
84. What is the main benefit of using 802.11ax Wi-Fi?
a) Longer range
b) Higher speed and efficiency
c) Better security
d) Easier setup
Answer: b) Higher speed and efficiency
85. Which technology allows devices to connect to a Wi-Fi
network without a password?
a) WEP
b) WPA2
c) WPS
d) SSID
Answer: c) WPS
86. Which tool can be used to automate network device
configuration?
a) Nmap
b) Ansible
c) PuTTY
d) Wireshark
Answer: b) Ansible
87. What is the purpose of a configuration management
database (CMDB)?
a) To store user credentials
b) To store configuration data of network devices
c) To monitor network traffic
d) To encrypt data
Answer: b) To store configuration data of network devices
88. Which command can be used to display the routing
table on a Windows system?
a) route print
b) ipconfig
c) netstat -r
d) tracert
Answer: a) route print
89. What does SLA stand for in networking?
a) Service Level Agreement
b) Secure Link Agreement
c) Service Link Agreement
d) Secure Level Agreement
Answer: a) Service Level Agreement
90. Which tool can be used to test the performance of a
network connection?
a) Wireshark
b) iperf
c) Nmap
d) PuTTY
Answer: b) iperf
91. What is the purpose of the "arp" command?
a) To display IP configuration
b) To manage IP routing
c) To display and modify the ARP cache
d) To trace packet routes
Answer: c) To display and modify the ARP cache
92. Which tool can be used to check for open ports on a
network device?
a) Wireshark
b) Nmap
c) FileZilla
d) PuTTY
Answer: b) Nmap
93. What does the "tracert" command do?
a) Displays IP configuration
b) Manages network connections
c) Traces the path of packets to a destination
d) Queries DNS servers
Answer: c) Traces the path of packets to a destination
94. Which command can be used to release and renew a
DHCP lease on a Windows system?
a) ipconfig /release and ipconfig /renew
b) netstat -r and netstat -an
c) ping and tracert
d) nslookup and dig
Answer: a) ipconfig /release and ipconfig /renew
95. What is the purpose of the "netsh" command?
a) To configure network interfaces
b) To trace packet routes
c) To capture network traffic
d) To manage wireless networks
Answer: a) To configure network interfaces
96. What is the function of a MAC address in a network?
a) To identify a device on a network
b) To route data packets
c) To encrypt data
d) To establish a connection
Answer: a) To identify a device on a network
97. What is the purpose of a network bridge?
a) To amplify signals
b) To connect different network segments
c) To route traffic
d) To provide wireless access
Answer: b) To connect different network segments
98. Which OSI layer is responsible for error detection and
correction?
a) Physical layer
b) Data link layer
c) Network layer
d) Transport layer
Answer: b) Data link layer
99. What is the main function of the application layer in
the OSI model?
a) To route data packets
b) To provide network services to applications
c) To format data
d) To encrypt data
Answer: b) To provide network services to applications
100. Which of the following is a characteristic of a mesh
topology?
a) All devices are connected to a central hub
b) All devices are connected to a single central cable
c) All devices are connected to each other
d) All devices are connected in a circle
Answer: c) All devices are connected to each other
101. Which protocol is used to access and maintain
directory information?
a) HTTP
b) FTP
c) LDAP
d) SMTP
Answer: c) LDAP
102. What does "SSL" stand for?
a) Secure Socket Layer
b) Secure System Layer
c) Simple Socket Layer
d) Simple System Layer
Answer: a) Secure Socket Layer
103. Which protocol is used for real-time communication
in IP networks?
a) HTTP
b) FTP
c) RTP
d) SMTP
Answer: c) RTP
104. What is the function of the ARP protocol?
a) To translate domain names to IP addresses
b) To assign IP addresses dynamically
c) To map IP addresses to MAC addresses
d) To route data packets
Answer: c) To map IP addresses to MAC addresses
105. Which protocol is used to automatically configure
devices on an IP network?
a) DNS
b) DHCP
c) FTP
d) SNMP
Answer: b) DHCP
106. What is the main function of a load balancer in a
network?
a) To amplify signals
b) To distribute network traffic evenly
c) To route traffic
d) To provide wireless access
Answer: b) To distribute network traffic evenly
107. Which device can create a wireless network from a
wired connection?
a) Switch
b) Hub
c) Router
d) Access Point
Answer: d) Access Point
108. What is the purpose of a media converter in a
network?
a) To route traffic
b) To convert signals between different media types
c) To connect devices
d) To store data
Answer: b) To convert signals between different media
types
109. Which device operates at the Physical layer of the OSI
model?
a) Router
b) Switch
c) Hub
d) Bridge
Answer: c) Hub
110. What is the main purpose of a wireless range
extender?
a) To route traffic
b) To extend the coverage area of a wireless network
c) To connect devices
d) To store data
Answer: b) To extend the coverage area of a wireless
network
111. What is the purpose of an IP address?
a) To identify a device on a network
b) To encrypt data
c) To establish a connection
d) To format data
Answer: a) To identify a device on a network
112. Which address is used to identify a network interface
in IPv6?
a) MAC address
b) IP address
c) Interface ID
d) Link-local address
Answer: c) Interface ID
113. What is the loopback IP address in IPv4?
a) 0.0.0.0
b) 127.0.0.1
c) 192.168.1.1
d) 10.0.0.1
Answer: b) 127.0.0.1
114. Which type of IP address is used for one-to-many
communication?
a) Unicast
b) Multicast
c) Broadcast
d) Anycast
Answer: b) Multicast
115. What is the purpose of an IPv6 address with a prefix
of "FE80::"?
a) Global unicast address
b) Multicast address
c) Link-local address
d) Anycast address
Answer: c) Link-local address

Network Security Continued Again


116. What is a firewall?
a) A device that routes traffic
b) A device that monitors and controls incoming and
outgoing network traffic
c) A device that stores data
d) A device that amplifies signals
Answer: b) A device that monitors and controls incoming
and outgoing network traffic
117. Which security protocol provides end-to-end
encryption for email?
a) FTP
b) SMTP
c) S/MIME
d) POP3
Answer: c) S/MIME
118. What is the purpose of a VPN?
a) To encrypt data over a public network
b) To route traffic
c) To store data
d) To amplify signals
Answer: a) To encrypt data over a public network
119. What does "ACL" stand for in network security?
a) Access Control List
b) Access Connection List
c) Advanced Control List
d) Advanced Connection List
Answer: a) Access Control List
120. Which tool can be used to detect and prevent
unauthorized access to a network?
a) Firewall
b) IDS
c) Router
d) Switch
Answer: b) IDS

You might also like