Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Networking mcqs

1. Question: What is the purpose of the OSI model?


 A. Data encryption
 B. Network communication standard
 C. Hardware design
 D. Software development
Answer: B. Network communication standard
2. Question: Which protocol is used for email communication?
 A. FTP
 B. SMTP
 C. HTTP
 D. ICMP
Answer: B. SMTP
3. Question: What is the function of a router in a network?
 A. Connects devices within the same LAN
 B. Filters and forwards data between networks
 C. Manages file storage
 D. Encrypts data transmission
Answer: B. Filters and forwards data between networks
4. Question: What is the purpose of DNS (Domain Name System)?
 A. File sharing
 B. IP address resolution to domain names
 C. Email communication
 D. Network security
Answer: B. IP address resolution to domain names
5. Question: What does the acronym DHCP stand for?
 A. Dynamic Host Configuration Protocol
 B. Data Handling and Control Protocol
 C. Digital High-Speed Connection Hub
 D. Domain Hosting and Configuration Platform
Answer: A. Dynamic Host Configuration Protocol
6. Question: Which of the following is a private IP address?
 A. 192.168.1.1
 B. 172.16.1.1
 C. 10.0.0.1
 D. All of the above
Answer: D. All of the above
7. Question: What does NAT (Network Address Translation) do?
 A. Encrypts network traffic
 B. Assigns IP addresses to devices
 C. Translates private IP addresses to a public IP address
 D. Manages network traffic flow
Answer: C. Translates private IP addresses to a public IP address
8. Question: Which layer of the OSI model is responsible for logical addressing?
 A. Data Link Layer
 B. Network Layer
 C. Transport Layer
 D. Presentation Layer
Answer: B. Network Layer
9. Question: What is the purpose of a firewall in a network?
 A. Prevent unauthorized access
 B. Increase network speed
 C. Provide physical security
 D. Manage email communication
Answer: A. Prevent unauthorized access
10. Question: Which protocol is used for secure data transmission over the Internet?
 A. FTP
 B. HTTPS
 C. Telnet
 D. SNMP
Answer: B. HTTPS
11. Question: What is the primary function of a switch in a network?
 A. Connects different networks
 B. Filters and forwards data based on MAC addresses
 C. Translates IP addresses
 D. Provides wireless connectivity
Answer: B. Filters and forwards data based on MAC addresses
12. Question: What is the default subnet mask for a Class C IP address?
 A. 255.0.0.0
 B. 255.255.0.0
 C. 255.255.255.0
 D. 255.255.255.255
Answer: C. 255.255.255.0
13. Question: What does the acronym LAN stand for?
 A. Local Area Network
 B. Long Access Node
 C. Large Area Network
 D. Logical Addressing Node
Answer: A. Local Area Network
14. Question: What is the purpose of ICMP (Internet Control Message Protocol)?
 A. Data encryption
 B. Network address translation
 C. Network diagnostics and error reporting
 D. File sharing
Answer: C. Network diagnostics and error reporting
15. Question: Which wireless networking standard is commonly used for home
networks?
 A. Bluetooth
 B. WiMAX
 C. 802.11 (Wi-Fi)
 D. NFC
Answer: C. 802.11 (Wi-Fi)
16. Question: What is the role of a gateway in a network?
 A. Connects devices within the same LAN
 B. Filters and forwards data between networks
 C. Manages wireless connections
 D. Translates data between different network protocols
Answer: D. Translates data between different network protocols
17. Question: What is a MAC address used for?
 A. Logical addressing
 B. Physical addressing
 C. IP address resolution
 D. Network diagnostics
Answer: B. Physical addressing
18. Question: Which of the following is a top-level domain (TLD)?
 A. .com
 B. www
 C. .net
 D. http
Answer: A. .com
19. Question: What is the purpose of VLAN (Virtual Local Area Network)?
 A. Increase network speed
 B. Secure wireless communication
 C. Segment a network for better traffic management
 D. Translate domain names to IP addresses
Answer: C. Segment a network for better traffic management
20. Question: What is the maximum range of an IPv6 address?
 A. 32 bits
 B. 64 bits
 C. 128 bits
 D. 256 bits
Answer: C. 128 bits
21. Question: Which transport layer protocol is connection-oriented?
 A. TCP
 B. UDP
 C. ICMP
 D. ARP
Answer: A. TCP
22. Question: What is the purpose of a proxy server in a network?
 A. Load balancing
 B. Security and privacy
 C. IP address resolution
 D. Wireless communication
Answer: B. Security and privacy
23. Question: Which networking device operates at the Data Link Layer of the OSI
model?
 A. Router
 B. Hub
 C. Switch
 D. Bridge
Answer: C. Switch
24. Question: What is the role of ARP (Address Resolution Protocol) in networking?
 A. IP address resolution to MAC addresses
 B. DNS resolution
 C. Wireless communication
 D. Network diagnostics
Answer: A. IP address resolution to MAC addresses
25. Question: What is the function of a DNS server?
 A. Data encryption
 B. IP address resolution to domain names
 C. Network diagnostics
 D. File sharing
Answer: B. IP address resolution to domain names
26. Question: What is the purpose of QoS (Quality of Service) in networking?
 A. Secure data transmission
 B. Optimize network speed
 C. Manage network traffic to ensure a certain level of service
 D. Assign IP addresses
Answer: C. Manage network traffic to ensure a certain level of service
27. Question: Which protocol is used for remotely accessing a network device?
 A. FTP
 B. Telnet
 C. HTTP
 D. SNMP
Answer: B. Telnet
28. Question: What is the function of the subnet mask in IP addressing?
 A. Identify the network portion of an IP address
 B. Identify the host portion of an IP address
 C. Encrypt data transmission
 D. Assign IP addresses to devices
Answer: A. Identify the network portion of an IP address
29. Question: Which of the following is a characteristic of a hub in networking?
 A. Operates at the Data Link Layer
 B. Forwards data based on MAC addresses
 C. Provides collision domain
 D. Filters and isolates network segments
Answer: C. Provides collision domain
30. Question: What is a VPN (Virtual Private Network) used for?
 A. Wireless communication
 B. Secure remote access
 C. Dynamic IP addressing
 D. Network diagnostics
Answer: B. Secure remote access
31. Question: Which of the following is a stateless protocol?
 A. TCP
 B. UDP
 C. ICMP
 D. ARP
Answer: B. UDP
32. Question: What is the purpose of a WPA key in Wi-Fi security?
 A. Enable wireless communication
 B. Encrypt data transmission
 C. Assign IP addresses
 D. Identify MAC addresses
Answer: B. Encrypt data transmission
33. Question: Which of the following is a valid IPv4 address?
 A. 192.256.1.1
 B. 300.100.50.25
 C. 172.30.45.67
 D. 10.0.0
Answer: C. 172.30.45.67
34. Question: What is the purpose of BGP (Border Gateway Protocol)?
 A. Dynamic host configuration
 B. Internet routing between autonomous systems
 C. Email communication
 D. Wireless security
Answer: B. Internet routing between autonomous systems
35. Question: Which of the following is a valid IPv6 address?
 A. 2001:G8::1
 B. 2607:f0d0:1002:51::4
 C. 192.168.1.1
 D. FF01:256:ABCD::1
Answer: B. 2607:f0d0:1002:51::4
36. Question: What is the purpose of STP (Spanning Tree Protocol) in networking?
 A. Load balancing
 B. Network redundancy elimination
 C. Wireless communication
 D. IP address resolution
Answer: B. Network redundancy elimination
37. Question: What is the role of SNMP (Simple Network Management Protocol)?
 A. Email communication
 B. Network diagnostics and management
 C. Data encryption
 D. IP address resolution
Answer: B. Network diagnostics and management
38. Question: Which of the following is a characteristic of a full-duplex
communication?
 A. One-way communication
 B. Bidirectional communication
 C. Broadcast communication
 D. Connectionless communication
Answer: B. Bidirectional communication
39. Question: What is the purpose of WEP (Wired Equivalent Privacy) in Wi-Fi
security?
 A. Encrypt data transmission
 B. Enable wireless communication
 C. Assign IP addresses
 D. Identify MAC addresses
Answer: A. Encrypt data transmission
40. Question: Which layer of the OSI model is responsible for error detection and
correction?
 A. Data Link Layer
 B. Transport Layer
 C. Network Layer
 D. Physical Layer
Answer: B. Transport Layer
41. Question: What is the purpose of ICMP Echo Request and Echo Reply
messages?
 A. Network diagnostics
 B. Data encryption
 C. IP address resolution
 D. Wireless communication
Answer: A. Network diagnostics
42. Question: Which protocol is used for secure remote file access?
 A. FTP
 B. SSH
 C. HTTP
 D. Telnet
Answer: B. SSH
43. Question: What is the purpose of DHCP Snooping in network security?
 A. Assigns IP addresses dynamically
 B. Filters and blocks DHCP traffic from unauthorized sources
 C. Encrypts network communication
 D. Manages wireless connections
Answer: B. Filters and blocks DHCP traffic from unauthorized sources
44. Question: Which of the following is a characteristic of a stateful firewall?
 A. Filters traffic based on IP addresses
 B. Examines the state of active connections
 C. Operates at the Data Link Layer
 D. Provides basic packet filtering
Answer: B. Examines the state of active connections
45. Question: What is the purpose of the command "ipconfig" in Windows?
 A. Display system information
 B. Configure IP addresses
 C. Test network connectivity
 D. Release and renew IP addresses
Answer: C. Test network connectivity
46. Question: What is the purpose of a DMZ (Demilitarized Zone) in network
security?
 A. Secure remote access
 B. Provide wireless connectivity
 C. Isolate and protect internal network servers
 D. Assign IP addresses dynamically
Answer: C. Isolate and protect internal network servers
47. Question: Which of the following is a characteristic of UDP (User Datagram
Protocol)?
 A. Connection-oriented
 B. Reliable data transmission
 C. Supports multicast and broadcast communication
 D. Operates at the Data Link Layer
Answer: C. Supports multicast and broadcast communication

You might also like