0% found this document useful (0 votes)
6 views

Computer Networks MCQs

The document contains a series of multiple-choice questions (MCQs) related to networking concepts, covering topics such as IP addresses, OSI model layers, protocols, and network devices. Each question is followed by the correct answer, providing a quick reference for understanding basic networking principles. The content serves as a study guide for individuals preparing for networking examinations or seeking to enhance their knowledge in the field.

Uploaded by

gunagvgg2248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Computer Networks MCQs

The document contains a series of multiple-choice questions (MCQs) related to networking concepts, covering topics such as IP addresses, OSI model layers, protocols, and network devices. Each question is followed by the correct answer, providing a quick reference for understanding basic networking principles. The content serves as a study guide for individuals preparing for networking examinations or seeking to enhance their knowledge in the field.

Uploaded by

gunagvgg2248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 54

NETWORKING

MCQS
0
25 5

QUESTION 20
15
10

1. What does IP stand for?

 A) Internet Protocol
 B) Internal Process
 C) Internet Provider
 D) Instant Processing
ANSWER
✅ Correct Answer: A) Internet Protocol
0
25 5

QUESTION 20
15
10

2. Which device connects multiple computers in a local


network?

 A) Router
 B) Switch
 C) Firewall
 D) Modem
ANSWER
✅ Correct Answer: B) Switch
0
25 5

QUESTION 20
15
10

3. What is the purpose of a subnet mask?

 A) To block unauthorized users


 B) To define the network and host portions of an IP
address
 C) To encrypt data
 D) To increase internet speed
ANSWER
✅ Correct Answer: B) To define the network and host
portions of an IP address
0
25 5

QUESTION 20
15
10

4. Which of the following is a private IP address?

 A) 192.168.1.1
 B) 8.8.8.8
 C) 172.67.35.9
 D) 204.12.45.2
ANSWER
✅ Correct Answer: A) 192.168.1.1
0
25 5

QUESTION 20
15
10

5. Which layer of the OSI model is responsible for physical


connections?

 A) Data Link
 B) Transport
 C) Network
 D) Physical
ANSWER
✅ Correct Answer: D) Physical
0
25 5

QUESTION 20
15
10

6. Which of the following is a Layer 3 device?

 A) Switch
 B) Router
 C) Hub
 D) Repeater
ANSWER
✅ Correct Answer: B) Router
0
25 5

QUESTION 20
15
10

7. What protocol is used to transfer web pages?

 A) FTP
 B) SMTP
 C) HTTP
 D) SNMP
ANSWER
✅ Correct Answer: C) HTTP
0
25 5

QUESTION 20
15
10

8. Which protocol is used for email sending?

 A) POP3
 B) SMTP
 C) IMAP
 D) HTTPS
ANSWER
✅ Correct Answer: B) SMTP
0
25 5

QUESTION 20
15
10

9. Which protocol is used to translate domain names into


IP addresses?

 A) FTP
 B) HTTP
 C) DNS
 D) DHCP
ANSWER
✅ Correct Answer: C) DNS
0
25 5

QUESTION 20
15
10

10. What is the default port number for HTTPS?

 A) 21
 B) 53
 C) 80
 D) 443
ANSWER
✅ Correct Answer: D) 443
0
25 5

QUESTION 20
15
10

11. Which layer of the OSI model handles error detection


and correction?

 A) Data Link
 B) Network
 C) Transport
 D) Session
ANSWER
✅ Correct Answer: A) Data Link
0
25 5

QUESTION 20
15
10

12. How many bits are there in a MAC address?

 A) 32
 B) 48
 C) 64
 D) 128
ANSWER
✅ Correct Answer: B) 48
0
25 5

QUESTION 20
15
10

13. What is the maximum number of hosts in a /26


subnet?

 A) 30
 B) 62
 C) 126
 D) 254
ANSWER
✅ Correct Answer: B) 62
0
25 5

QUESTION 20
15
10

14. Which command is used to find the IP address


assigned to your computer?

 A) ping
 B) ipconfig/ifconfig
 C) tracert
 D) netstat
ANSWER
✅ Correct Answer: B) ipconfig / ifconfig
0
25 5

QUESTION 20
15
10

15. Which of the following is a class B IP address?

 A) 10.0.0.1
 B) 172.16.0.1
 C) 192.168.1.1
 D) 224.0.0.1
ANSWER
✅ Correct Answer: B) 172.16.0.1
0
25 5

QUESTION 20
15
10

16. Which protocol is used for securely accessing a remote


computer?

 A) Telnet
 B) SSH
 C) HTTP
 D) SNMP
ANSWER
✅ Correct Answer: B) SSH
0
25 5

QUESTION 20
15
10

17. Which of the following is a link-state routing protocol?

 A) RIP
 B) OSPF
 C) BGP
 D) EIGRP
ANSWER
✅ Correct Answer: B) OSPF
0
25 5

QUESTION 20
15
10

18. Which of the following is NOT a function of a firewall?

 A) Packet filtering
 B) Preventing unauthorized access
 C) Encrypting data
 D) Monitoring network traffic
ANSWER
✅ Correct Answer: C) Encrypting data
0
25 5

QUESTION 20
15
10

19. Which service dynamically assigns IP addresses to


devices?

 A) DNS
 B) DHCP
 C) FTP
 D) SNMP
ANSWER
✅ Correct Answer: B) DHCP
0
25 5

QUESTION 20
15
10

20. What is the purpose of NAT (Network Address


Translation)?

 A) Converts domain names to IP addresses


 B) Encrypts data for security
 C) Allows multiple devices to share a public IP
 D) Routes packets between networks
ANSWER
✅ Correct Answer: C) Allows multiple devices to share a
public IP
0
25 5

QUESTION 20
15
10

21. Which of the following is a Layer 4 protocol?

 A) IP
 B) TCP
 C) ARP
 D) ICMP
ANSWER
✅ Correct Answer: B) TCP
0
25 5

QUESTION 20
15
10

22. What is the primary purpose of the BGP protocol?

 A) Internal network routing


 B) External network routing
 C) Encrypting internet traffic
 D) Resolving domain names
ANSWER
✅ Correct Answer: B) External network routing
0
25 5

QUESTION 20
15
10

23. Which type of firewall operates at the Application layer


of the OSI model?

 A) Packet-filtering firewall
 B) Proxy firewall
 C) Stateful firewall
 D) NAT firewall
ANSWER
✅ Correct Answer: B) Proxy firewall
0
25 5

QUESTION 20
15
10

24. Which IPv6 address type is used for one-to-many


communication?

 A) Unicast
 B) Multicast
 C) Anycast
 D) Broadcast
ANSWER
✅ Correct Answer: B) Multicast
0
25 5

QUESTION 20
15
10

25. Which protocol is used for network time


synchronization?

 A) FTP
 B) SNMP
 C) NTP
 D) ARP
ANSWER
✅ Correct Answer: C) NTP
0
25 5

QUESTION 20
15
10

26. Which type of attack floods a network with


overwhelming traffic?

 A) Phishing
 B) Man-in-the-Middle
 C) DDoS
 D) SQL Injection
ANSWER
✅ Correct Answer: C) DDoS
THAN
K YOU

You might also like