0% found this document useful (0 votes)
77 views11 pages

Networking Question

networking question

Uploaded by

rajajit2746
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views11 pages

Networking Question

networking question

Uploaded by

rajajit2746
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

1. Which protocol is used to assign IP addresses automatically to devices on a network?

o a) TCP
o b) DHCP
o c) DNS
o d) HTTP
Answer: b) DHCP
2. What is the maximum size of an IPv4 address?
o a) 32 bits
o b) 64 bits
o c) 128 bits
o d) 256 bits
Answer: a) 32 bits
3. Which layer of the OSI model is responsible for error detection and correction?
o a) Data Link
o b) Network
o c) Transport
o d) Session
Answer: a) Data Link
4. What is the default subnet mask for a Class C IP address?
o a) 255.0.0.0
o b) 255.255.0.0
o c) 255.255.255.0
o d) 255.255.255.255
Answer: c) 255.255.255.0
5. Which of the following is a connection-oriented protocol?
o a) UDP
o b) ICMP
o c) TCP
o d) IP
Answer: c) TCP
6. What does DNS stand for in networking?
o a) Digital Network System
o b) Domain Name Service
o c) Distributed Network System
o d) Domain Name System
Answer: d) Domain Name System
7. Which port number is used by HTTPS?
o a) 80
o b) 443
o c) 21
o d) 8080
Answer: b) 443
8. Which device operates at the network layer of the OSI model?
o a) Router
o b) Switch
o c) Hub
o d) Repeater
Answer: a) Router
9. Which of the following is a routing protocol?
o a) FTP
o b) RIP
o c) HTTP
o d) SMTP
Answer: b) RIP
10. What does the acronym NAT stand for?
o a) Network Address Translation
o b) Network Access Translation
o c) Network Address Transmission
o d) None of the above
Answer: a) Network Address Translation
11. Which protocol provides reliable, ordered, and error-checked delivery of data?
o a) UDP
o b) TCP
o c) IP
o d) FTP
Answer: b) TCP
12. Which device is used to segment a network into multiple collision domains?
o a) Hub
o b) Switch
o c) Repeater
o d) Bridge
Answer: b) Switch
13. What is the purpose of ARP in networking?
o a) To resolve IP addresses to MAC addresses
o b) To resolve domain names to IP addresses
o c) To establish a secure connection
o d) To route packets across the network
Answer: a) To resolve IP addresses to MAC addresses
14. Which command is used to check the connectivity between two devices in a network?
o a) tracert
o b) ipconfig
o c) ping
o d) telnet
Answer: c) ping
15. What does VLAN stand for?
o a) Virtual Local Area Network
o b) Virtual LAN
o c) Very Large Area Network
o d) Virtual Loopback Area Network
Answer: a) Virtual Local Area Network

1. Which protocol is used for email services?


o a) FTP
o b) SMTP
o c) HTTP
o d) SNMP
Answer: b) SMTP
2. Which device forwards data based on MAC addresses?
o a) Router
o b) Switch
o c) Hub
o d) Repeater
Answer: b) Switch
3. Which protocol resolves IP addresses to MAC addresses?
o a) DNS
o b) DHCP
o c) ARP
o d) RARP
Answer: c) ARP
4. Which layer in the OSI model deals with logical addressing?
o a) Data Link
o b) Network
o c) Transport
o d) Application
Answer: b) Network
5. Which layer of the OSI model establishes, manages, and terminates connections?
o a) Application
o b) Presentation
o c) Session
o d) Transport
Answer: c) Session
6. Which of the following is a Class B IP address?
o a) 192.168.1.1
o b) 172.16.0.1
o c) 10.0.0.1
o d) 224.0.0.1
Answer: b) 172.16.0.1
7. What is the range of Class A IP addresses?
o a) 1.0.0.0 to 126.255.255.255
o b) 128.0.0.0 to 191.255.255.255
o c) 192.0.0.0 to 223.255.255.255
o d) 224.0.0.0 to 239.255.255.255
Answer: a) 1.0.0.0 to 126.255.255.255
8. Which layer of the OSI model handles flow control and error control?
o a) Data Link
o b) Transport
o c) Session
o d) Network
Answer: b) Transport
9. What is the primary function of a firewall?
o a) To encrypt data
o b) To filter traffic
o c) To forward packets
o d) To perform NAT
Answer: b) To filter traffic
10. Which layer in the OSI model is responsible for end-to-end communication?
o a) Application
o b) Presentation
o c) Transport
o d) Session
Answer: c) Transport
11. What is the purpose of the TCP three-way handshake?
o a) To establish a secure connection
o b) To terminate a connection
o c) To establish a reliable connection
o d) To route data
Answer: c) To establish a reliable connection
12. Which device is used to divide a network into multiple subnetworks?
o a) Router
o b) Switch
o c) Hub
o d) Repeater
Answer: a) Router
13. Which transport layer protocol is used by DNS?
o a) TCP
o b) UDP
o c) ICMP
o d) FTP
Answer: b) UDP
14. Which protocol is used for secure web communication?
o a) HTTP
o b) HTTPS
o c) FTP
o d) SMTP
Answer: b) HTTPS
15. Which protocol operates at the application layer of the OSI model?
o a) IP
o b) TCP
o c) FTP
o d) ARP
Answer: c) FTP
16. Which protocol is used for file transfer over the internet?
o a) FTP
o b) SMTP
o c) DNS
o d) SNMP
Answer: a) FTP
17. What is the full form of FTP?
o a) File Transfer Protocol
o b) File Transmission Protocol
o c) File Translate Protocol
o d) File Transform Protocol
Answer: a) File Transfer Protocol
18. Which of the following is not a routing protocol?
o a) OSPF
o b) BGP
o c) RIP
o d) HTTP
Answer: d) HTTP
19. Which protocol does a web browser use to access a web page?
o a) FTP
o b) HTTP
o c) SMTP
o d) SNMP
Answer: b) HTTP
20. Which port is used for FTP data transfer?
o a) 21
o b) 23
o c) 25
o d) 20
Answer: d) 20
21. Which topology is most efficient for small networks?
o a) Star
o b) Bus
o c) Ring
o d) Mesh
Answer: a) Star
22. What is the size of an IPv6 address?
o a) 32 bits
o b) 64 bits
o c) 128 bits
o d) 256 bits
Answer: c) 128 bits
23. Which of the following is a connectionless protocol?
o a) TCP
o b) UDP
o c) FTP
o d) SMTP
Answer: b) UDP
24. Which layer in the OSI model provides encryption and decryption?
o a) Transport
o b) Application
o c) Presentation
o d) Session
Answer: c) Presentation
25. What is the purpose of the ICMP protocol?
o a) To send error messages
o b) To encrypt data
o c) To establish a connection
o d) To transfer files
Answer: a) To send error messages
26. Which network topology has a single point of failure?
o a) Star
o b) Bus
o c) Mesh
o d) Ring
Answer: b) Bus
27. Which of the following protocols is used for remote login?
o a) FTP
o b) HTTP
o c) Telnet
o d) SMTP
Answer: c) Telnet
28. Which device is used to connect different networks?
o a) Hub
o b) Router
o c) Switch
o d) Repeater
Answer: b) Router
29. What is the size of a MAC address?
o a) 32 bits
o b) 48 bits
o c) 64 bits
o d) 128 bits
Answer: b) 48 bits
30. Which command is used to display the routing table in a computer?
o a) ipconfig
o b) ping
o c) tracert
o d) netstat
Answer: d) netstat
31. What is the purpose of a proxy server?
o a) To monitor network traffic
o b) To cache web content
o c) To block unauthorized access
o d) To transfer files
Answer: b) To cache web content
32. Which protocol is used to monitor network devices?
o a) HTTP
o b) SNMP
o c) FTP
o d) SSH
Answer: b) SNMP
33. Which layer of the OSI model deals with routing of packets?
o a) Transport
o b) Network
o c) Data Link
o d) Physical
Answer: b) Network
34. What does SSL stand for?
o a) Secure Sockets Layer
o b) Secure Software Layer
o c) System Socket Layer
o d) Secure Session Layer
Answer: a) Secure Sockets Layer
35. Which protocol is used to dynamically assign IP addresses to devices?
o a) DHCP
o b) DNS
o c) ARP
o d) ICMP
Answer: a) DHCP
36. What is the function of a switch in networking?
o a) To forward packets based on MAC addresses
o b) To connect two different networks
o c) To act as a wireless access point
o d) To provide internet access
Answer: a) To forward packets based on MAC addresses
37. Which network layer protocol is used for congestion control?
o a) TCP
o b) IP
o c) UDP
o d) ARP
Answer: a) TCP
38. What does the command 'ping' check in networking?
o a) Data transmission speed
o b) Internet connectivity
o c) Packet loss
o d) Round-trip time
Answer: d) Round-trip time
39. Which device is used to amplify a signal in a network?
o a) Router
o b) Hub
o c) Repeater
o d) Switch
Answer: c) Repeater
40. Which protocol is used to securely transfer files over a network?
o a) FTP
o b) SFTP
o c) TFTP
o d) HTTP
Answer: b) SFTP
41. Which port is used by Telnet for communication?
o a) 21
o b) 23
o c) 25
o d) 80
Answer: b) 23
42. What is the purpose of the DNS protocol?
o a) To resolve domain names to IP addresses
o b) To assign dynamic IP addresses
o c) To monitor network traffic
o d) To encrypt data
Answer: a) To resolve domain names to IP addresses
43. Which protocol is responsible for error reporting in the network?
o a) ARP
o b) ICMP
o c) TCP
o d) UDP
Answer: b) ICMP
44. Which of the following is a distance-vector routing protocol?
o a) OSPF
o b) RIP
o c) EIGRP
o d) BGP
Answer: b) RIP
45. What does TCP stand for in networking?
o a) Transmission Control Protocol
o b) Transfer Control Protocol
o c) Transport Communication Protocol
o d) Transmission Communication Protocol
Answer: a) Transmission Control Protocol
46. Which port is used by DNS for communication?
o a) 23
o b) 53
o c) 80
o d) 443
Answer: b) 53
47. Which layer of the OSI model does the IP protocol operate in?
o a) Data Link
o b) Network
o c) Transport
o d) Session
Answer: b) Network
48. Which of the following protocols is used for network management?
o a) HTTP
o b) SNMP
o c) SMTP
o d) DHCP
Answer: b) SNMP
49. What is the purpose of the NAT protocol?
o a) To route packets
o b) To translate private IP addresses to public IP addresses
o c) To assign dynamic IP addresses
o d) To encrypt data
Answer: b) To translate private IP addresses to public IP addresses
50. Which protocol is used for time synchronization in a network?
o a) NTP
o b) FTP
o c) HTTP
o d) DNS
Answer: a) NTP
51-100: Advanced Networking Concepts
51. Which routing algorithm finds the shortest path in a network?
o a) Distance Vector
o b) Link State
o c) Hybrid
o d) Static
Answer: b) Link State
52. Which protocol is used to send a query to a DNS server?
o a) TCP
o b) UDP
o c) ICMP
o d) RIP
Answer: b) UDP
53. What is the maximum length of a cable in a 100BASE-T network?
o a) 50 meters
o b) 100 meters
o c) 200 meters
o d) 500 meters
Answer: b) 100 meters
54. Which device is used to connect wireless devices to a wired network?
o a) Router
o b) Switch
o c) Access Point
o d) Hub
Answer: c) Access Point
55. Which routing protocol uses a hierarchical structure?
o a) OSPF
o b) RIP
o c) BGP
o d) EIGRP Answer: a) OSPF
56. What is the default port number for HTTP?
o a) 21
o b) 80
o c) 443
o d) 8080 Answer: b) 80
57. What is the default port number for HTTPS?
o a) 80
o b) 443
o c) 21
o d) 23 Answer: b) 443
58. What is the function of the Spanning Tree Protocol (STP)?
o a) To prevent loops in a network
o b) To encrypt data
o c) To route packets
o d) To assign IP addresses
Answer: a) To prevent loops in a network
59. Which type of routing protocol is EIGRP?
o a) Link State
o b) Distance Vector
o c) Hybrid
o d) Static Answer: c) Hybrid
o
60. What is the maximum number of hops allowed in a RIP network?
o a) 10
o b) 15
o c) 20
o d) 25
Answer: b) 15
61. What is the primary purpose of a VPN?
o a) To encrypt network traffic
o b) To monitor network performance
o c) To create a secure connection over a public network
o d) To route packets
Answer: c) To create a secure connection over a public network
62. Which layer of the OSI model is responsible for data encryption?
o a) Application
o b) Presentation
o c) Network
o d) Transport
Answer: b) Presentation
63. Which protocol is used to retrieve emails from a mail server?
o a) SMTP
o b) POP3
o c) FTP
o d) HTTP
Answer: b) POP3
64. Which command is used to display the current IP address of a computer?
o a) ping
o b) ipconfig
o c) tracert
o d) netstat
Answer: b) ipconfig
65. Which command is used to trace the route to a remote host?
o a) ping
o b) tracert
o c) ipconfig
o d) netstat
Answer: b) tracert
66. What is the maximum number of IP addresses in a Class C network?
o a) 254
o b) 510
o c) 1024
o d) 2048
Answer: a) 254
67. What is the primary purpose of the BGP protocol?
o a) To encrypt data
o b) To monitor network devices
o c) To route packets between autonomous systems
o d) To assign IP addresses
Answer: c) To route packets between autonomous systems
68. Which layer of the OSI model is responsible for packet fragmentation?
o a) Transport
o b) Network
o c) Data Link
o d) Physical
Answer: b) Network
69. Which protocol is used to transfer files between hosts without requiring authentication?
o a) FTP
o b) TFTP
o c) SFTP
o d) HTTP
Answer: b) TFTP
70. What does QoS stand for?
o a) Quality of Service
o b) Query of Service
o c) Queue of Services
o d) Quality of Security Answer: a) Quality of Service
71. Which command is used to display the ARP table in a computer?
o a) ping
o b) arp -a
o c) tracert
o d) netstat Answer: b) arp -a

72. Which protocol is used to synchronize the time between devices on a network?
o a) SMTP
o b) NTP
o c) SNMP
o d) FTP
Answer: b) NTP
73. Which routing protocol is used for inter-domain routing on the internet?
o a) RIP
o b) OSPF
o c) EIGRP
o d) BGP
Answer: d) BGP
74. What is the maximum number of IP addresses in a Class B network?
o a) 65534
o b) 32768
o c) 131072
o d) 262144
Answer: a) 65534
75. Which protocol is used to discover network devices and services on a local network?
o a) DNS
o b) DHCP
o c) LLDP
o d) FTP
Answer: c) LLDP
76. Which type of attack attempts to overwhelm a network with a large amount of traffic?
o a) DDoS
o b) Man-in-the-middle
o c) Phishing
o d) Spoofing
Answer: a) DDoS
77. Which protocol is used to manage network devices remotely?
o a) HTTP
o b) SSH
o c) FTP
o d) SMTP
Answer: b) SSH
78. Which protocol is used to send email over the internet?
o a) FTP
o b) HTTP
o c) SMTP
o d) SNMP
Answer: c) SMTP
79. Which type of IP address is automatically assigned by a DHCP server?
o a) Static
o b) Dynamic
o c) Public
o d) Private
Answer: b) Dynamic
80. What does TTL stand for in networking?
o a) Time to Live
o b) Transfer to Live
o c) Time to Lease
o d) Transport to Live
Answer: a) Time to Live
81. Which protocol is responsible for routing multicast traffic?
o a) RIP
o b) OSPF
o c) IGMP
od) EIGRP
Answer: c) IGMP
82. Which command is used to test the reachability of a host on a network?
o a) ping
o b) ipconfig
o c) tracert
o d) netstat
Answer: a) ping
83. Which type of firewall filters traffic based on port numbers?
o a) Packet-filtering firewall
o b) Stateful firewall
o c) Proxy firewall
o d) Next-generation firewall
Answer: a) Packet-filtering firewall

84. Which protocol is used for directory services in a network?


o a) LDAP
o b) DNS
o c) DHCP
od) FTP
Answer: a) LDAP
85. Which command is used to display the MAC address of a computer?
o a) ping
o b) ipconfig /all
o c) tracert
o d) netstat Answer: b) ipconfig /all
86. Which protocol is used to automatically configure network devices with IP addresses?
o a) DNS
o b) DHCP
o c) FTP
o d) HTTP
Answer: b) DHCP
87. Which protocol is used to secure web traffic?
o a) FTP
o b) HTTP
o c) HTTPS
o d) SMTP
Answer: c) HTTPS
88. Which protocol is used for network time synchronization?
o a) FTP
o b) NTP
o c) SNMP
o d) DNS
Answer: b) NTP
89. Which type of firewall can track the state of network connections?
o a) Packet-filtering firewall
o b) Stateful firewall
o c) Proxy firewall
o d) Next-generation firewall
Answer: b) Stateful firewall
90. Which protocol is used to monitor network devices?
o a) HTTP
o b) SNMP
o c) FTP
o d) SMTP
Answer: b) SNMP
91. Which command is used to display network statistics?
o a) ping
o b) ipconfig
o c) tracert
o d) netstat
Answer: d) netstat
92. Which protocol is used to securely transfer files over a network?
o a) FTP
o b) SFTP
o c) TFTP
o d) HTTP
Answer: b) SFTP
93. Which protocol is used to manage network devices?
o a) SNMP
o b) FTP
o c) HTTP
o d) SMTP Answer: a) SNMP
94. Which type of network is used to connect devices within a small geographic area?
o a) WAN
o b) LAN
o c) MAN
o d) PAN Answer: b) LAN
95. Which protocol is used for dynamic routing between networks?
o a) RIP
o b) OSPF
o c) BGP
o d) EIGRP Answer: a) RIP
96. Which command is used to display the routing table on a computer?
o a) ping
o b) tracert
o c) route print
o d) netstat Answer: c) route print

97. Which protocol is used to assign IP addresses automatically?


o a) DNS
o b) DHCP
o c) ARP
o d) FTP
Answer: b) DHCP
98. Which type of attack attempts to gain unauthorized access to a network?
o a) Spoofing
o b) Phishing
o c) Brute force
o d) Man-in-the-middle
Answer: a) Spoofing
99. Which protocol is used for encrypted communication between devices?
o a) FTP
o b) HTTP
o c) SSH
o d) SNMP
Answer: c) SSH
100. Which type of network device is used to forward packets between different networks? - a) Switch
- b) Router
- c) Hub
- d) Repeater
Answer: b) Router
101. Which of the following is a symmetric encryption algorithm? - a) RSA
- b) AES
- c) DSA
- d) ECC
Answer: b) AES
102. Which protocol is used to resolve domain names to IP addresses? - a) DNS
- b) DHCP
- c) SNMP
- d) ARP
Answer: a) DNS
103. Which network topology provides the highest redundancy? - a) Star
- b) Ring
- c) Mesh
- d) Bus
Answer: c) Mesh
104. Which device is used to connect multiple devices in a network? - a) Router
- b) Switch
- c) Hub
- d) Repeater
Answer: b) Switch
105. What is the primary function of a network firewall? - a) To filter incoming and outgoing traffic
- b) To encrypt network traffic
- c) To route packets
- d) To monitor network performance
Answer: a) To filter incoming and outgoing traffic
106. Which protocol is used to encrypt web traffic? - a) HTTP
- b) FTP
- c) HTTPS
- d) SNMP
Answer: c) HTTPS
107. Which command is used to test the reachability of a network device? - a) ping
- b) ipconfig
- c) tracert
- d) netstat
Answer: a) ping
108. Which layer of the OSI model is responsible for data encryption? - a) Network
- b) Transport
- c) Presentation
- d) Session
Answer: c) Presentation
109. Which protocol is used to establish a secure connection between devices? - a) FTP
- b) SSH
- c) SNMP
- d) SMTP
Answer: b) SSH
110. Which command is used to display network statistics on a computer? - a) ping
- b) ipconfig
- c) tracert
- d) netstat Answer: d) netstat
111. Which protocol is used to send email messages? - a) FTP
- b) SMTP
- c) SNMP
- d) HTTP Answer: b) SMTP
112. Which protocol is used to secure remote login? - a) FTP
- b) SSH
- c) HTTP
- d) SNMP
Answer: b) SSH
113. Which type of attack involves intercepting communication between two parties? - a) Spoofing
- b) Phishing
- c) Man-in-the-middle
- d) Brute force
Answer: c) Man-in-the-middle
114. Which protocol is used to securely transfer files over a network? - a) FTP
- b) SFTP
- c) TFTP
- d) HTTP
Answer: b) SFTP
115. Which command is used to display the MAC address of a network interface? - a) ping
- b) ipconfig /all
- c) tracert
- d) netstat
Answer: b) ipconfig /all
116. Which type of network connects devices within a single building or campus? - a) WAN
- b) LAN
- c) MAN
- d) PAN
Answer: b) LAN

You might also like