100% found this document useful (1 vote)
74 views

Questions Bank

The document contains 57 multiple choice questions about networking concepts including IP addressing, subnetting, protocols, network devices, and the OSI model. The questions cover topics such as the purpose of IP, NAT, DHCP, DNS, subnet masks, private IP addressing ranges, MAC addressing, network ports, encryption protocols, network topologies, and routing algorithms.

Uploaded by

Arian SS
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
74 views

Questions Bank

The document contains 57 multiple choice questions about networking concepts including IP addressing, subnetting, protocols, network devices, and the OSI model. The questions cover topics such as the purpose of IP, NAT, DHCP, DNS, subnet masks, private IP addressing ranges, MAC addressing, network ports, encryption protocols, network topologies, and routing algorithms.

Uploaded by

Arian SS
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Subject: Computer Network Stage: 3 Computer

1. What does IP stand for in IP addressing?


a) Internet Protocol
b) Information Protocol
c) Internet Port
d) Integrated Protocol

2. Which version of IP addressing is the most widely used today?


a) IPv2
b) IPv4
c) IPv6
d) IPv8

3. How many bits are in an IPv4 address?


a) 16 bits
b) 32 bits
c) 64 bits
d) 128 bits

4. How many octets are there in an IPv4 address?


a) 2 octets
b) 4 octets
c) 8 octets
d) 16 octets

5. Which class of IP addresses is used for multicasting?


a) Class A
b) Class B
c) Class C
d) Class D
6. Which class of IP addresses is primarily used for private networks?
a) Class A
b) Class B
c) Class C
d) Class D

7. How many usable host addresses are available in a Class C IP network?


a) 254
b) 256
c) 510
d) 512

8. Which IPv6 address type is used for loopback purposes, similar to IPv4's
127.0.0.1?
a) Unicast
b) Multicast
c) Anycast
d) Loopcast

9. What is the purpose of NAT (Network Address Translation)?


a) Encrypting data packets
b) Assigning unique IP addresses
c) Translating private to public IP addresses
d) Creating virtual networks

10.Which of the following is a valid IPv4 address?


a) 256.168.1.1
b) 192.168.300.1
c) 10.0.0.256
d) 172.16.0.1
11.What does DHCP stand for in networking?
a) Domain Hosting Control Protocol
b) Dynamic Host Configuration Protocol
c) Digital Hosting and Configuration Protocol
d) Direct Host Connectivity Protocol

12.Which subnet mask is associated with a Class C IP address?


a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255

13.Which of the following is a feature of IPv6?


a) Smaller address space compared to IPv4
b) Elimination of NAT
c) No support for multicast
d) IPv4 compatibility

14.What is the purpose of an IP address subnetting?


a) Increasing security of IP addresses
b) Expanding the size of IP addresses
c) Dividing a large network into smaller segments
d) Assigning multiple IP addresses to a single device

15.What is the loopback IP address in IPv4?


a) 0.0.0.0
b) 127.0.0.1
c) 255.255.255.255
d) 192.168.1.1
16.Which of the following is a valid IPv6 address format?
a) 2001:G456:1234::ABCD
b) 2001:0db8:85a3::0042:7007
c) 192.168.1.1
d) 1234:5678:ABCD::EFGH

17.Which protocol resolves IP addresses to MAC addresses in a local network?


a) ARP (Address Resolution Protocol)
b) DNS (Domain Name System)
c) DHCP (Dynamic Host Configuration Protocol)
d) ICMP (Internet Control Message Protocol)

18.Which of the following IP ranges is reserved for Automatic Private IP


Addressing (APIPA)?
a) 169.254.0.0 - 169.255.255.255
b) 192.168.0.0 - 192.168.255.255
c) 10.0.0.0 - 10.255.255.255
d) 172.16.0.0 - 172.31.255.255

19.Which IPv6 address scope is used for communication within a single link or
interface?
a) Global Unicast
b) Link-Local
c) Unique Local
d) Multicast

20.In CIDR notation, what is the equivalent of the subnet mask


255.255.255.224?
a) /26
b) /27
c) /28
d) /29

21.What does the acronym "LAN" stand for in networking?


a) Local Area Network
b) Long Area Network
c) Large Access Network
d) Low Availability Network

22.Which device operates at Layer 2 of the OSI model?


a) Router
b) Hub
c) Switch
d) Firewall

23.What is the primary purpose of DNS (Domain Name System)?


a) Providing encryption for network traffic
b) Assigning IP addresses to devices
c) Resolving domain names to IP addresses
d) Managing network routing tables

24.Which protocol is commonly used for sending emails?


a) HTTP
b) SMTP
c) FTP
d) SNMP

25.What is the purpose of NAT (Network Address Translation)?


a) Encrypting network traffic
b) Translating domain names to IP addresses
c) Assigning IP addresses to devices
d) Allowing multiple devices to share a single public IP address

26.Which subnet mask would be used to divide an IP address into 8 subnets?


e) 255.255.255.0
a) 255.255.240.0
b) 255.255.255.128
c) 255.255.255.192

27.Which protocol is used to remotely access and manage network devices?


d) FTP
a) SSH
b) SMTP
c) POP3

28.Which of the following is a private IP address?


a) 192.168.1.1
b) 216.45.32.21
c) 128.55.66.77
d) 172.30.40.50

29.Which layer of the OSI model is responsible for logical addressing and
routing?
e) Physical layer
a) Data Link layer
b) Network layer
c) Transport layer

30.What is the purpose of ARP (Address Resolution Protocol)?


a) Assigning IP addresses to devices
b) Resolving MAC addresses to IP addresses
c) Translating domain names to IP addresses
d) Discovering the MAC address of a device on the same network

31.Which protocol is used to securely transfer files over a network?


a) HTTP
b) FTP
c) SNMP
d) Telnet

32.Which networking device operates at Layer 3 of the OSI model?


a) Switch
b) Hub
c) Router
d) Bridge

33.What is the purpose of a subnet mask in IP networking?


e) To provide security for network traffic
a) To translate domain names to IP addresses
b) To divide an IP address into network and host portions
c) To determine the physical location of a device on the network

34.Which protocol is used for secure communication over the web (https)?
a) FTP
b) HTTP
c) SNMP
d) SSL/TLS
35.Which device connects multiple networks together and forwards data
based on MAC addresses?
a) Switch
b) Router
c) Hub
d) Firewall

36.Which type of network topology connects all devices in a linear sequence?


a) Bus
b) Ring
c) Star
d) Mesh

37.Which protocol is used to automatically assign IP addresses to devices in a


network?
a) DNS
b) DHCP
c) ARP
d) POP3

38.What is the purpose of a default gateway in a TCP/IP network?


e) To provide DNS services
a) To connect two LANs together
b) To provide access to the Internet
c) To manage network security

39.Which protocol is responsible for error detection and flow control in data
transmission?
d) HTTP
a) ICMP
b) FTP
c) SMTP

40.Which networking component enables wireless devices to connect to a


wired network?
a) Access Point
b) Bridge
c) Router
d) Switch

41.What is the primary function of a firewall in network security?


a) Assigning IP addresses
b) Managing network traffic
c) Resolving domain names
d) Transferring files

42.Which protocol is used for retrieving emails from a mail server?


a) HTTP
b) IMAP
c) SNMP
d) SMTP

43.In TCP/IP networking, how many bits are in an IPv4 address?


a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits

44.Which layer of the OSI model is responsible for data segmentation and
reassembly?
a) Transport layer
b) Network layer
c) Data Link layer
d) Presentation layer

45.What is the purpose of a MAC address?


a) To identify a device on a network
b) To translate domain names to IP addresses
c) To assign IP addresses to devices
d) To manage network routing tables

46.Which network protocol is used to translate human-readable domain


names into IP addresses?
a) ARP
b) DHCP
c) DNS
d) ICMP

47.What is the main difference between half-duplex and full-duplex


communication?
a) Half-duplex can transmit and receive simultaneously, while full-
duplex cannot.
b) Full-duplex can transmit and receive simultaneously, while half-
duplex cannot.
c) Half-duplex uses a different set of protocols than full-duplex.
d) Full-duplex requires a higher data rate than half-duplex.

48.Which OSI layer is responsible for converting data from one format to
another during transmission?
a) Presentation layer
b) Session layer
c) Transport layer
d) Data Link layer

49.Which IP address range is reserved for loopback testing?


a) 10.0.0.0 - 10.255.255.255
b) 172.16.0.0 - 172.31.255.255
c) 192.168.0.0 - 192.168.255.255
d) 127.0.0.0 - 127.255.255.255

50.Which routing algorithm considers the number of hops to reach a


destination?
a) OSPF
b) EIGRP
c) RIP
d) BGP

51.Which protocol is used to securely log in to a remote server?


a) FTP
b) Telnet
c) SSH
d) HTTP

52.What is the primary role of a proxy server?


a) Translating domain names to IP addresses
b) Blocking network attacks
c) Accelerating web traffic
d) Managing network routing

53.Which wireless encryption protocol is considered the most secure as of


2021?
a) WEP
b) WPA
c) WPA2
d) WPA3

54.Which protocol is responsible for identifying unique devices on a network


using MAC addresses?
a) ARP
b) ICMP
c) DHCP
d) RARP

55.Which layer of the OSI model is responsible for ensuring data is delivered
reliably between two devices?
a) Network layer
b) Data Link layer
c) Transport layer
d) Session layer

56.What is the purpose of VLANs (Virtual Local Area Networks)?


a) To segment a physical network into multiple logical networks
b) To provide wireless connectivity in a network
c) To translate IP addresses to MAC addresses
d) To assign IP addresses to devices dynamically

57.Which network device filters and forwards data based on MAC addresses?
a) Router
b) Bridge
c) Switch
d) Hub
58.Which protocol is used to resolve IP addresses to MAC addresses in a local
network?
a) DNS
b) DHCP
c) ARP
d) SNMP

59.What is the purpose of ICMP (Internet Control Message Protocol)?


a) To provide secure communication
b) To manage network traffic
c) To resolve domain names
d) To report errors and network conditions

60.Which protocol is used for remote device monitoring and management?


a) HTTP
b) SMTP
c) SNMP
d) FTP

You might also like