Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Networking Mcqs

1. Which device operates at the Data Link Layer (Layer 2) of the OSI model?RouterSwitchHubFirewallB) SwitchThis is the explaination of this mcsqs
2. What is the default port number for HTTP?212580443C) 80This is the explaination of this mcsqs
3. Which protocol is used to assign IP addresses automatically to devices in a network?DNSDHCPFTPSNMPB) DHCPThis is the explaination of this mcsqs
4. What does DNS stand for?Dynamic Network SystemDomain Name ServiceDomain Name SystemData Network ServerC) Domain Name SystemThis is the explaination of this mcsqs
5. Which of the following is a connectionless protocol?TCPUDPFTPSMTPB) UDPThis is the explaination of this mcsqs
6. What is the maximum length of a MAC address?32 bits48 bits64 bits128 bitsB) 48 bitsThis is the explaination of this mcsqs
7. Which topology has a central device to which all nodes are connected?BusRingMeshStarD) StarThis is the explaination of this mcsqs
8. What does the ping command test?Bandwidth usageNetwork connectivityFile transfer speedSecurity vulnerabilitiesB) Network connectivityThis is the explaination of this mcsqs
9. Which layer of the OSI model handles encryption and decryption of data?PhysicalPresentationSessionTransportB) PresentationThis is the explaination of this mcsqs
10. What is the IPv6 address length?32 bits64 bits128 bits256 bitsC) 128 bitsThis is the explaination of this mcsqs
11. Which of the following is a routing protocol?HTTPBGPFTPSNMPB) BGPThis is the explaination of this mcsqs
12. What type of cabling is most commonly used in Ethernet networks?CoaxialFiber opticTwisted pairSerial C) Twisted pairThis is the explaination of this mcsqs
13. What does NAT stand for in networking?Network Address TranslationNetwork Access TechnologyNode Access TransferNetwork Allocation TableA) Network Address TranslationThis is the explaination of this mcsqs
14. In networking, what does VPN stand for?Virtual Private NetworkVariable Protocol Node Verified Public NetworkVirtual Packet NetworkA) Virtual Private NetworkThis is the explaination of this mcsqs
15. What protocol is used for secure communication over a network?HTTPFTPSSHSNMPC) SSHThis is the explaination of this mcsqs
16. What is the main purpose of a firewall?To increase bandwidthTo block unauthorized accessTo optimize data compressionTo boost wireless signalsB) To block unauthorized accessThis is the explaination of this mcsqs
17. Which of the following is a lossless data compression algorithm used in networking?JPEGLZWMP3MPEGB) LZWThis is the explaination of this mcsqs
18. What is the function of an Access Point (AP) in a wireless network?Provides wired network accessActs as a firewallConnects wireless devices to a wired networkEncrypts network dataC) Connects wireless devices to a wired networkThis is the explaination of this mcsqs
19. Which command displays the routing table in Windows? ipconfig pingtracertroute printD) route printThis is the explaination of this mcsqs
20. What does ISP stand for?Internet Security ProtocolInternational Server ProviderInternet Service ProviderInternal Signal ProcessingC) Internet Service ProviderThis is the explaination of this mcsqs
21. Which protocol is used to send emails?FTPSMTPSNMPHTTPB) SMTPThis is the explaination of this mcsqs
22. What type of attack involves overwhelming a system with traffic to make it unavailable?PhishingMan-in-the-MiddleDDoSBrute ForceC) DDoSThis is the explaination of this mcsqs
23. Which command is used to display active network connections on a system? pingtracert netstatipconfigC) netstatThis is the explaination of this mcsqs
24. What is the range of a private IP address in IPv4?10.0.0.0 – 10.255.255.255172.16.0.0 – 172.31.255.255192.168.0.0 – 192.168.255.255 All of the aboveD) All of the aboveThis is the explaination of this mcsqs
25. Which protocol translates domain names into IP addresses?HTTPFTPDNSDHCPC) DNSThis is the explaination of this mcsqs
26. What is the primary function of the Transport Layer in the OSI model?Routing packetsManaging data encryptionProviding end-to-end communication and error handlingDefining network hardwareC) Providing end-to-end communication and error handlingThis is the explaination of this mcsqs
27. Which device is used to connect different networks together?SwitchHubRouterRepeaterC) RouterThis is the explaination of this mcsqs
28. What is the maximum transmission unit (MTU) size for Ethernet frames by default?1280 bytes1500 bytes512 bytes1024 bytesB) 1500 bytesThis is the explaination of this mcsqs
29. What does SSL stand for?Secure Socket LayerSafe System LinkSecure Service LevelServer Security LinkA) Secure Socket LayerThis is the explaination of this mcsqs
30. What kind of address is FF:FF:FF:FF:FF:FF in networking?Unicast addressBroadcast addressMulticast addressLoopback addressB) Broadcast addressThis is the explaination of this mcsqs
31. What is a loopback address in IPv4?192.168.1.110.0.0.1127.0.0.1255.255.255.0C) 127.0.0.1This is the explaination of this mcsqs
32. What does ARP stand for in networking?Address Resolution ProtocolAutomatic Routing ProtocolActive Response ProtocolAccess Routing ProcessA) Address Resolution ProtocolThis is the explaination of this mcsqs
33. Which wireless encryption standard is considered the most secure?WEP WPAWPA2WPA3D) WPA3This is the explaination of this mcsqs
34. What does ICMP stand for?Internet Connection Management ProtocolInternet Control Message ProtocolInternal Control Management ProtocolInternational Communication Management ProcessB) Internet Control Message ProtocolThis is the explaination of this mcsqs
35. Which network topology offers high redundancy but requires more cabling?StarMeshRingBusB) MeshThis is the explaination of this mcsqs
36. What is the main function of a proxy server?To provide a direct connection to the internetTo cache web content and filter network trafficTo assign IP addresses to devicesTo perform encryption on network packetsB) To cache web content and filter network trafficThis is the explaination of this mcsqs
37. Which IP address is reserved for broadcast messages in IPv4?192.168.1.1255.255.255.255127.0.0.1 0.0.0.0 255.255.255.255This is the explaination of this mcsqs
38. What is the main purpose of a subnet mask?To identify the host portion of an IP addressTo determine the network and host portions of an IP addressTo assign MAC addresses to devicesTo encrypt data packetsB) To determine the network and host portions of an IP addressThis is the explaination of this mcsqs
39. Which protocol is used to securely access and manage network devices remotely?TelnetFTPSSH SNMPC) SSHThis is the explaination of this mcsqs
40. What is the maximum number of hosts in a Class C network?25451010222046A) 254This is the explaination of this mcsqs
41. Which of the following is a layer 3 device in the OSI model?HubSwitchRouterRepeaterC) RouterThis is the explaination of this mcsqs
42. What does MPLS stand for?Multiple Protocol Layer SwitchingMultiprotocol Label SwitchingMain Protocol Link SystemManaged Packet Link ServiceB) Multiprotocol Label SwitchingThis is the explaination of this mcsqs
43. Which protocol is used for network time synchronization?NTPSNMP IMAPARPA) NTPThis is the explaination of this mcsqs
44. What is the default port number for HTTPS?225344380C) 443This is the explaination of this mcsqs
45. Which IPv6 address type is used for one-to-many communication?UnicastAnycastBroadcastMulticastD) MulticastThis is the explaination of this mcsqs
46. Which type of DNS record is used to map a domain name to an IP address? MXACNAMETXTB) AThis is the explaination of this mcsqs
47. What is the main function of DHCP?To resolve domain names To allocate IP addresses dynamically To encrypt network packets To control network trafficB) To allocate IP addresses dynamicallyThis is the explaination of this mcsqs
48. What is the term for an unauthorized user monitoring network traffic?PhishingSpoofingEavesdroppingFloodingC) EavesdroppingThis is the explaination of this mcsqs
49. What is the collision domain in networking?A group of devices that share the same bandwidth A network area where only one device can transmit at a timeA secured network segmentA broadcast stormB) A network area where only one device can transmit at a timeThis is the explaination of this mcsqs
50. Which network device can segment a network into multiple VLANs?HubRouterSwitchRepeater C) SwitchThis is the explaination of this mcsqs
51. What is the main advantage of fiber optic cables?Low costHigh bandwidth and long-distance transmissionEasy installationSupports wireless signalsB) High bandwidth and long-distance transmissionThis is the explaination of this mcsqs
52. What does TTL (Time To Live) in a packet indicate? Number of routers a packet can pass throughPacket sizeEncryption statusNetwork bandwidthA) Number of routers a packet can pass throughThis is the explaination of this mcsqs
53. What is the default subnet mask for a Class B network?255.0.0.0255.255.0.0255.255.255.0255.255.255.255B) 255.255.0.0This is the explaination of this mcsqs
54. What is the IPv4 address range for APIPA (Automatic Private IP Addressing)?192.168.0.0/16169.254.0.0/16172.16.0.0/1210.0.0.0/8B) 169.254.0.0/16This is the explaination of this mcsqs
55. Which type of cable is commonly used in data centers for high-speed networking?Twisted pairCoaxialFiber opticSerial C) Fiber opticThis is the explaination of this mcsqs
56. What does CIDR stand for?Classless Internet Domain RoutingClassless Inter-Domain RoutingConnection Identifier RoutingCentralized Internet Data RoutingB) Classless Inter-Domain RoutingThis is the explaination of this mcsqs
57. Which of the following is a Layer 4 protocol? TCPIPARPICMPA) TCPThis is the explaination of this mcsqs
58. What is the function of the Session Layer in the OSI model?Routing packetsEstablishing, maintaining, and terminating connectionsFormatting dataEncrypting packetsB) Establishing, maintaining, and terminating connectionsThis is the explaination of this mcsqs
59. Which device helps reduce network congestion by filtering traffic based on MAC addresses?HubSwitchRepeaterBridgeB) SwitchThis is the explaination of this mcsqs
60. What is the main advantage of using VLANs?Increased network speedImproved network security and segmentationEliminates network cablingReduces latencyB) Improved network security and segmentationThis is the explaination of this mcsqs
61. What is the default port number for FTP (File Transfer Protocol)? 20 and 21222553A ) 20 and 21This is the explaination of this mcsqs
62. Which protocol is used for remote desktop access?SSHRDPFTPSNMP B) RDPThis is the explaination of this mcsqs
63. Which layer of the OSI model is responsible for data encryption and compression?SessionPresentationApplicationTransportB) PresentationThis is the explaination of this mcsqs
64. What is the primary function of ICMP (Internet Control Message Protocol)?File transfer Error reporting and diagnosticsEmail communicationWeb browsingB) Error reporting and diagnosticsThis is the explaination of this mcsqs
65. Which network topology does not require a central device?StarBusHybridMeshB) BusThis is the explaination of this mcsqs
66. Which layer in the OSI model deals with logical addressing?Data LinkNetworkTransportPhysicalB) NetworkThis is the explaination of this mcsqs
67. What does a router use to determine the best path for forwarding packets?MAC addressIP addressSubnet maskARPB) IP addressThis is the explaination of this mcsqs
68. What does VPN tunneling provide?Increased bandwidthSecure communication over public networksLower latencyUnrestricted access to all websitesB) Secure communication over public networksThis is the explaination of this mcsqs
69. What is the purpose of QoS (Quality of Service) in networking?To increase network bandwidth To prioritize certain types of network trafficTo improve wireless signal strengthTo eliminate network congestionB) To prioritize certain types of network trafficThis is the explaination of this mcsqs
70. What type of attack spoofs an ARP response to redirect network traffic? Man-in-the-Middle (MITM)PhishingDenial of Service (DoS)Ransomware A) Man-in-the-Middle (MITM)This is the explaination of this mcsqs
71. What does Wi-Fi stand for?Wireless FidelityWireless FrequencyWide Field NetworkWired-Free InternetA) Wireless FidelityThis is the explaination of this mcsqs
72. Which device operates at Layer 1 (Physical Layer) of the OSI model?RouterSwitchHubFirewallC) HubThis is the explaination of this mcsqs
73. What is the default gateway in a network?The local DNS server The device that routes traffic outside the local networkThe first hop in a tracerouteThe network firewallB) The device that routes traffic outside the local networkThis is the explaination of this mcsqs
74. What does WPA2 use for encryption? WEPAESDES RSAB) AESThis is the explaination of this mcsqs
75. What is the purpose of a DMZ (Demilitarized Zone) in network security?To isolate sensitive data from public accessTo provide a direct connection to the internetTo store encrypted files To reduce power consumptionA) To isolate sensitive data from public accessThis is the explaination of this mcsqs
76. What is the function of traceroute?It tests network connectivity It traces the path packets take to reach a destinationIt encrypts network trafficIt assigns IP addresses B) It traces the path packets take to reach a destinationThis is the explaination of this mcsqs
77. Which of the following protocols is used for secure web browsing?HTTPHTTPS FTPTELNETB) HTTPSThis is the explaination of this mcsqs
78. What is the maximum transmission speed of Gigabit Ethernet (GbE)?100 Mbps1 Gbps10 Gbps100 GbpsB) 1 GbpsThis is the explaination of this mcsqs
79. What is a broadcast domain? A network segment where broadcasts are containedA group of IP addresses assigned to a routerA layer of the OSI modelA dedicated wireless channelA) A network segment where broadcasts are containedThis is the explaination of this mcsqs
80. What is the purpose of port forwarding in networking?To route traffic to a specific device inside a private networkTo increase bandwidth speedTo encrypt network packetsTo block unauthorized accessA) To route traffic to a specific device inside a private networkThis is the explaination of this mcsqs
81. What is the standard frequency for Wi-Fi networks?900 MHz2.4 GHz and 5 GHz1.2 GHz and 3 GHz 10 GHz and 20 GHzB) 2.4 GHz and 5 GHzThis is the explaination of this mcsqs
82. What type of network is a MAN (Metropolitan Area Network)?A local network within a building A city-wide networkA nationwide networkA personal home networkB) A city-wide networkThis is the explaination of this mcsqs
83. Which IEEE standard defines Ethernet?802.3802.11802.15802.1XA) 802.3This is the explaination of this mcsqs
84. What does IPv4 address 0.0.0.0 typically indicate?An invalid IP addressThe default routeA private networkA multicast address B) The default routeThis is the explaination of this mcsqs
85. What is the purpose of the CSMA/CD protocol?To prevent data collisions in wired networksTo encrypt data packetsTo manage virtual private networksTo block unauthorized network accessA) To prevent data collisions in wired networksThis is the explaination of this mcsqs
86. What does the PING command measure? BandwidthLatency (Round-trip time)Packet sizeEncryption levelB) Latency (Round-trip time)This is the explaination of this mcsqs
87. What is the maximum data rate of 802.11ac Wi-Fi?54 Mbps300 Mbps 1 Gbps6.9 GbpsD) 6.9 GbpsThis is the explaination of this mcsqs
88. Which protocol is used for secure file transfer?HTTPFTPSFTPOP3C) SFTPThis is the explaination of this mcsqs
89. What is the function of SNMP (Simple Network Management Protocol)?Managing network devicesEncrypting network trafficRouting packets between networksEstablishing secure VPN connectionsA) Managing network devicesThis is the explaination of this mcsqs
90. What is EtherChannel used for?Combining multiple links into a single logical linkEncrypting network trafficIncreasing wireless signal strengthAllocating IP addressesA) Combining multiple links into a single logical linkThis is the explaination of this mcsqs
What is the main function of a firewall in networking?To connect different networksTo monitor and control incoming and outgoing network trafficTo provide faster internet accessTo assign IP addresses dynamicallyB) To monitor and control incoming and outgoing network trafficThis is the explaination of this mcsqs
92. Which network topology provides redundancy and is the most fault-tolerant?BusRingStarMeshD) MeshThis is the explaination of this mcsqs
93. What does PoE (Power over Ethernet) do?Allows Ethernet cables to carry electrical powerIncreases internet speedEncrypts Ethernet packetsReduces network congestionA) Allows Ethernet cables to carry electrical powerThis is the explaination of this mcsqs
94. Which network device operates at Layer 2 (Data Link Layer)?RouterSwitchModemFirewallB) SwitchThis is the explaination of this mcsqs
95. What is the default subnet mask for a Class A network?255.255.255.0 255.255.0.0255.0.0.0255.255.255.255 C) 255.0.0.0This is the explaination of this mcsqs
96. What is the primary function of ARP (Address Resolution Protocol)?Resolving domain names to IP addressesConverting IP addresses to MAC addressesEncrypting network trafficAssigning private IP addresses B) Converting IP addresses to MAC addressesThis is the explaination of this mcsqs
97. Which technology is commonly used for wireless local area networks (WLANs)?EthernetBluetoothWi-FiDSLC) Wi-FiThis is the explaination of this mcsqs
98. Which type of NAT allows multiple private IP addresses to share a single public IP address? Static NATDynamic NATPAT (Port Address Translation)One-to-One NATC) PAT (Port Address Translation)This is the explaination of this mcsqs
99. What does DNS (Domain Name System) do?Assigns MAC addresses to devicesTranslates domain names to IP addressesFilters network trafficManages encryption keysB) Translates domain names to IP addressesThis is the explaination of this mcsqs
100. What is the primary advantage of using IPv6 over IPv4?Faster internet speedsLarger address space and improved securityEasier network configurationLower hardware costsB) Larger address space and improved securityThis is the explaination of this mcsqs

Start Practicing Today — Free, No Registration, Thousands of MCQs for PPSC, NTS, FPSC & More!

X
Scroll to Top