0% found this document useful (0 votes)
8 views

Computer Networks MCQS

The document contains multiple-choice questions (MCQs) related to computer networks, categorized into easy, medium, and hard levels. It covers various topics such as network topologies, protocols, OSI and TCP/IP models, and network security. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in computer networking.

Uploaded by

Shantanu Dhage
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Networks MCQS

The document contains multiple-choice questions (MCQs) related to computer networks, categorized into easy, medium, and hard levels. It covers various topics such as network topologies, protocols, OSI and TCP/IP models, and network security. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in computer networking.

Uploaded by

Shantanu Dhage
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

Computer Networks MCQS

Set 1
Easy
1. What is the primary purpose of a computer network?
a) To store data
b) To connect computers and allow them to communicate
c) To increase processing power
d) To reduce electricity consumption
Answer: b) To connect computers and allow them to communicate
2. Which of the following is not a type of network topology?
a) Bus
b) Star
c) Ring
d) Cube
Answer: d) Cube
3. What does LAN stand for?
a) Large Area Network
b) Local Area Network
c) Long Access Network
d) Limited Area Network
Answer: b) Local Area Network
4. Which layer of the OSI model is responsible for routing?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
Answer: c) Network Layer
5. What is the purpose of an IP address?
a) To identify a specific device on a network
b) To encrypt data
c) To compress data
d) To increase network speed
Answer: a) To identify a specific device on a network
6. Which of the following is not a valid IP address?
a) 192.168.0.1
b) 10.0.0.1
c) 256.1.1.1
d) 172.16.0.1
Answer: c) 256.1.1.1
7. What does HTTP stand for?
a) Hyper Text Transfer Protocol
b) High Tech Transfer Protocol
c) Hyper Transfer Text Protocol
d) Host Text Transfer Protocol
Answer: a) Hyper Text Transfer Protocol
8. Which device is used to connect different networks?
a) Hub
b) Switch
c) Router
d) Repeater
Answer: c) Router
9. What is the maximum length of an Ethernet cable?
a) 50 meters
b) 100 meters
c) 500 meters
d) 1000 meters
Answer: b) 100 meters
10. Which of the following is not a wireless network standard?
a) Wi-Fi
b) Bluetooth
c) ZigBee
d) Ethernet
Answer: d) Ethernet
Medium
11. What is the purpose of the ARP protocol?
a) To translate domain names to IP addresses
b) To map IP addresses to MAC addresses
c) To encrypt network traffic
d) To compress data packets
Answer: b) To map IP addresses to MAC addresses
12. Which layer of the TCP/IP model corresponds to the
Application, Presentation, and Session layers of the OSI model?
a) Application Layer
b) Transport Layer
c) Internet Layer
d) Network Access Layer
Answer: a) Application Layer
13. What is the main difference between TCP and UDP?
a) TCP is connectionless, UDP is connection-oriented
b) TCP provides reliable data transfer, UDP does not
c) TCP is faster than UDP
d) UDP supports flow control, TCP does not
Answer: b) TCP provides reliable data transfer, UDP does not
14. What is the purpose of CSMA/CD in Ethernet networks?
a) To encrypt data
b) To detect and handle collisions
c) To increase network speed
d) To assign IP addresses
Answer: b) To detect and handle collisions
15. Which of the following is not a function of the Data Link
Layer?
a) Framing
b) Error detection
c) Flow control
d) Routing
Answer: d) Routing
16. What is the purpose of NAT (Network Address
Translation)?
a) To increase network security
b) To conserve IP addresses
c) To improve network performance
d) To encrypt network traffic
Answer: b) To conserve IP addresses
17. Which protocol is used for sending email?
a) HTTP
b) FTP
c) SMTP
d) SSH
Answer: c) SMTP
18. What is the maximum number of IP addresses possible in a
/24 subnet?
a) 128
b) 256
c) 512
d) 1024
Answer: b) 256
19. Which of the following is not a valid IPv6 address
representation?
a) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
b) 2001:db8:85a3::8a2e:370:7334
c) 2001.0db8.85a3.0000.0000.8a2e.0370.7334
d) ::1
Answer: c) 2001.0db8.85a3.0000.0000.8a2e.0370.7334
20. What is the purpose of ICMP?
a) To establish connections between hosts
b) To report errors and provide network diagnostics
c) To assign IP addresses dynamically
d) To encrypt network traffic
Answer: b) To report errors and provide network diagnostics
Hard
21. Which routing protocol uses the Dijkstra algorithm to
calculate the shortest path?
a) RIP
b) OSPF
c) BGP
d) EIGRP
Answer: b) OSPF
22. What is the time complexity of the ARP protocol in the
worst-case scenario?
a) O(1)
b) O(log n)
c) O(n)
d) O(n^2)
Answer: c) O(n)
23. Which of the following is not a characteristic of the QUIC
protocol?
a) Reduced connection establishment time
b) Improved congestion control
c) Built-in encryption
d) Guaranteed in-order delivery of all packets
Answer: d) Guaranteed in-order delivery of all packets
24. What is the purpose of the SCTP protocol?
a) To provide reliable, connection-oriented communication like
TCP
b) To offer unreliable, connectionless communication like UDP
c) To combine features of both TCP and UDP
d) To replace IP at the network layer
Answer: c) To combine features of both TCP and UDP
25. Which of the following is not a method used in congestion
control?
a) Slow start
b) Congestion avoidance
c) Fast retransmit
d) Selective acknowledgment
Answer: d) Selective acknowledgment
26. What is the main difference between link-state and
distance-vector routing protocols?
a) Link-state protocols use hop count, while distance-vector
protocols use link costs
b) Link-state protocols maintain a complete network topology,
while distance-vector protocols only know their neighbors
c) Link-state protocols are used in LANs, while distance-vector
protocols are used in WANs
d) Link-state protocols are connectionless, while distance-vector
protocols are connection-oriented
Answer: b) Link-state protocols maintain a complete network
topology, while distance-vector protocols only know their neighbors
27. Which of the following is not a feature of Software-
Defined Networking (SDN)?
a) Separation of control plane and data plane
b) Centralized network control
c) Programmability of network behavior
d) Hardware-based packet forwarding decisions
Answer: d) Hardware-based packet forwarding decisions
28. What is the purpose of the DTLS protocol?
a) To provide security for stream-based protocols like TCP
b) To provide security for datagram-based protocols like UDP
c) To replace TLS in all applications
d) To encrypt routing information in networks
Answer: b) To provide security for datagram-based protocols like
UDP
29. Which of the following is not a characteristic of the MPLS
protocol?
a) Label-based forwarding
b) Traffic engineering capabilities
c) Support for Quality of Service (QoS)
d) End-to-end encryption
Answer: d) End-to-end encryption
30. What is the main advantage of using Bloom filters in
network applications?
a) They provide perfect accuracy in membership queries
b) They allow for efficient removal of elements
c) They offer space-efficient probabilistic data structure
d) They guarantee no false negatives in membership queries
Answer: c) They offer space-efficient probabilistic data structure
Set 2
Easy
1. What is the primary function of a switch in a network?
a) To connect different networks
b) To forward packets between devices on the same network
c) To assign IP addresses
d) To encrypt data
Answer: b) To forward packets between devices on the same network
2. Which layer of the OSI model is responsible for data
encryption?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Presentation Layer
Answer: d) Presentation Layer
3. What does DNS stand for?
a) Dynamic Network System
b) Domain Name System
c) Data Network Service
d) Distributed Network Security
Answer: b) Domain Name System
4. Which of the following is not a valid network class?
a) Class A
b) Class B
c) Class C
d) Class E
Answer: d) Class E
5. What is the purpose of DHCP?
a) To assign IP addresses dynamically
b) To encrypt network traffic
c) To route packets between networks
d) To compress data
Answer: a) To assign IP addresses dynamically
6. Which protocol is used for secure remote login?
a) HTTP
b) FTP
c) SSH
d) SMTP
Answer: c) SSH
7. What is the maximum number of hosts possible in a /28 subnet?
a) 8
b) 14
c) 16
d) 32
Answer: b) 14
8. Which of the following is not a wireless network technology?
a) Wi-Fi
b) Bluetooth
c) NFC
d) Ethernet
Answer: d) Ethernet
9. What is the purpose of a firewall?
a) To increase network speed
b) To provide wireless connectivity
c) To protect against unauthorized access
d) To assign IP addresses
Answer: c) To protect against unauthorized access
10. Which layer of the TCP/IP model is responsible for
routing?
a) Application Layer
b) Transport Layer
c) Internet Layer
d) Link Layer
Answer: c) Internet Layer
Medium
11. What is the difference between a hub and a switch?
a) A hub is intelligent and a switch is not
b) A switch uses MAC addresses to forward frames, a hub does
not
c) A hub provides full-duplex communication, a switch does not
d) A switch is used for WANs, a hub is used for LANs
Answer: b) A switch uses MAC addresses to forward frames, a hub
does not
12. Which of the following is not a characteristic of IPv6?
a) 128-bit addresses
b) Built-in security features
c) Simplified header format
d) Broadcast support
Answer: d) Broadcast support
13. What is the purpose of the SYN flag in TCP?
a) To indicate the end of data transmission
b) To acknowledge received data
c) To initiate a connection
d) To request retransmission of lost packets
Answer: c) To initiate a connection
14. Which routing protocol is commonly used between
autonomous systems?
a) RIP
b) OSPF
c) BGP
d) EIGRP
Answer: c) BGP
15. What is the main purpose of VLAN technology?
a) To increase network speed
b) To segment a network logically
c) To provide wireless connectivity
d) To encrypt network traffic
Answer: b) To segment a network logically
16. Which of the following is not a function of the Transport
Layer?
a) Segmentation
b) Flow control
c) Error detection
d) Routing
Answer: d) Routing
17. What is the purpose of the TTL field in an IP packet?
a) To indicate the packet's priority
b) To prevent packets from circulating indefinitely
c) To specify the packet's destination
d) To encrypt the packet's contents
Answer: b) To prevent packets from circulating indefinitely
18. Which protocol is used for real-time streaming of audio
and video?
a) HTTP
b) FTP
c) RTP
d) SMTP
Answer: c) RTP
19. What is the main difference between unicast and multicast
transmission?
a) Unicast is faster than multicast
b) Unicast sends data to a single recipient, multicast sends to
multiple recipients
c) Unicast uses TCP, multicast uses UDP
d) Unicast is used for LANs, multicast is used for WANs
Answer: b) Unicast sends data to a single recipient, multicast sends to
multiple recipients
20. Which of the following is not a method of network access
control?
a) MAC address filtering
b) 802.1X authentication
c) WPA encryption
d) CSMA/CD
Answer: d) CSMA/CD
Hard
21. What is the purpose of the BGP protocol's AS_PATH
attribute?
a) To prevent routing loops
b) To encrypt routing information
c) To specify the destination network
d) To indicate the packet's priority
Answer: a) To prevent routing loops
22. Which of the following is not a characteristic of the QUIC
protocol?
a) Reduced connection establishment time
b) Improved congestion control
c) Support for multiplexing
d) Guaranteed delivery of all packets
Answer: d) Guaranteed delivery of all packets
23. What is the main difference between IPsec transport mode
and tunnel mode?
a) Transport mode encrypts only the payload, tunnel mode
encrypts the entire packet
b) Transport mode is faster than tunnel mode
c) Tunnel mode is used for host-to-host communication,
transport mode for network-to-network
d) Transport mode uses AH, tunnel mode uses ESP
Answer: a) Transport mode encrypts only the payload, tunnel mode
encrypts the entire packet
24. Which of the following is not a method used in QoS
(Quality of Service) implementation?
a) Traffic shaping
b) Priority queuing
c) Weighted fair queuing
d) Round-robin scheduling
Answer: d) Round-robin scheduling
25. What is the purpose of the SCTP protocol's multi-homing
feature?
a) To support multiple IP addresses for a single endpoint
b) To enable communication between different operating
systems
c) To increase the maximum transmission unit (MTU)
d) To provide backward compatibility with TCP
Answer: a) To support multiple IP addresses for a single endpoint
26. Which of the following is not a characteristic of Software-
Defined Networking (SDN)?
a) Centralized control plane
b) Programmability of network behavior
c) Separation of control and data planes
d) Hardware-based forwarding decisions
Answer: d) Hardware-based forwarding decisions
27. What is the main advantage of using Bloom filters in
network applications?
a) They provide perfect accuracy in membership queries
b) They allow for efficient removal of elements
c) They offer space-efficient probabilistic data structure
d) They guarantee no false positives in membership queries
Answer: c) They offer space-efficient probabilistic data structure
28. Which of the following is not a feature of the MPLS
protocol?
a) Label-based forwarding
b) Traffic engineering capabilities
c) Support for Quality of Service (QoS)
d) End-to-end encryption
Answer: d) End-to-end encryption
29. What is the purpose of the DTLS protocol?
a) To provide security for stream-based protocols like TCP
b) To provide security for datagram-based protocols like UDP
c) To replace TLS in all applications
d) To encrypt routing information in networks
Answer: b) To provide security for datagram-based protocols like
UDP
30. Which of the following best describes the CAP theorem in
distributed systems?
a) Consistency, Availability, Partition tolerance - choose two
b) Consistency, Atomicity, Persistence - choose all three
c) Confidentiality, Authentication, Privacy - choose one
d) Caching, Asynchronous processing, Parallelism - choose two
Answer: a) Consistency, Availability, Partition tolerance - choose two
Set 3
Easy
1. What does URL stand for?
a) Universal Resource Locator
b) Uniform Resource Locator
c) Unique Resource Locator
d) Unified Resource Locator
Answer: b) Uniform Resource Locator
2. Which layer of the OSI model is responsible for logical
addressing?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
Answer: c) Network Layer
3. What is the purpose of a subnet mask?
a) To encrypt data
b) To identify the network and host portions of an IP address
c) To increase network speed
d) To assign IP addresses dynamically
Answer: b) To identify the network and host portions of an IP address
4. Which of the following is not a valid MAC address?
a) 00:1A:2B:3C:4D:5E
b) FF:FF:FF:FF:FF:FF
c) 192.168.0.1
d) 01:23:45:67:89:AB
Answer: c) 192.168.0.1
5. What is the primary function of a router?
a) To connect different networks
b) To assign IP addresses
c) To encrypt data
d) To provide wireless connectivity
Answer: a) To connect different networks
6. Which protocol is used for transferring files between a client
and server?
a) HTTP
b) FTP
c) SMTP
d) SSH
Answer: b) FTP
7. What is the default port number for HTTP?
a) 21
b) 25
c) 80
d) 443
Answer: c) 80
8. Which of the following is not a type of network cable?
a) Coaxial cable
b) Twisted pair cable
c) Fiber optic cable
d) Wireless cable
Answer: d) Wireless cable
9. What does VPN stand for?
a) Virtual Private Network
b) Very Personal Network
c) Visual Protocol Network
d) Verified Public Network
Answer: a) Virtual Private Network
10. Which of the following is not a function of the Application
Layer?
a) File transfer
b) Email
c) Web browsing
d) Error detection
Answer: d) Error detection
Medium
11. What is the purpose of the ARP protocol?
a) To translate domain names to IP addresses
b) To map IP addresses to MAC addresses
c) To encrypt network traffic
d) To assign IP addresses dynamically
Answer: b) To map IP addresses to MAC addresses
12. Which of the following is not a characteristic of UDP?
a) Connectionless
b) Unreliable
c) Low overhead
d) Guaranteed delivery
Answer: d) Guaranteed delivery
13. What is the main purpose of OSPF protocol?
a) To provide secure communication
b) To assign IP addresses
c) To route packets within an autonomous system
d) To translate domain names to IP addresses
Answer: c) To route packets within an autonomous system
14. Which of the following is not a method of error detection
in data communication?
a) Parity check
b) Checksum
c) Cyclic Redundancy Check (CRC)
d) Forward Error Correction (FEC)
Answer: d) Forward Error Correction (FEC)
15. What is the purpose of the STP (Spanning Tree Protocol)?
a) To prevent routing loops in switched networks
b) To encrypt network traffic
c) To assign IP addresses dynamically
d) To compress data packets
Answer: a) To prevent routing loops in switched networks
16. Which of the following is not a characteristic of IPv6?
a) Larger address space
b) Built-in security features
c) Simplified header format
d) Backward compatibility with IPv4
Answer: d) Backward compatibility with IPv4
17. What is the main difference between a hub and a switch?
a) A hub is intelligent and a switch is not
b) A switch uses MAC addresses to forward frames, a hub does
not
c) A hub provides full-duplex communication, a switch does not
d) A switch is used for WANs, a hub is used for LANs
Answer: b) A switch uses MAC addresses to forward frames, a hub
does not
18. Which protocol is used for secure web browsing?
a) HTTP
b) HTTPS
c) FTP
d) SMTP
Answer: b) HTTPS
19. What is the purpose of NAT (Network Address
Translation)?
a) To increase network security
b) To conserve IP addresses
c) To improve network performance
d) To encrypt network traffic
Answer: b) To conserve IP addresses
20. Which of the following is not a type of network topology?
a) Mesh
b) Star
c) Bus
d) Pyramid
Answer: d) Pyramid
Hard
21. What is the purpose of the BGP protocol's LOCAL_PREF
attribute?
a) To indicate the preferred path for outbound traffic
b) To encrypt routing information
c) To specify the destination network
d) To prevent routing loops
Answer: a) To indicate the preferred path for outbound traffic
22. Which of the following is not a characteristic of the SCTP
protocol?
a) Multi-homing support
b) Message-oriented communication
c) Built-in congestion control
d) Connection-less communication
Answer: d) Connection-less communication
23. What is the main difference between IntServ and DiffServ
QoS models?
a) IntServ provides per-flow guarantees, DiffServ provides per-
class guarantees
b) IntServ is used for LANs, DiffServ for WANs
c) IntServ uses RSVP, DiffServ uses OSPF
d) IntServ is connectionless, DiffServ is connection-oriented
Answer: a) IntServ provides per-flow guarantees, DiffServ provides
per-class guarantees
24. Which of the following is not a method used in congestion
control?
a) Slow start
b) Congestion avoidance
c) Fast retransmit
d) Selective acknowledgment
Answer: d) Selective acknowledgment
25. What is the purpose of the MPLS protocol?
a) To provide end-to-end encryption
b) To enable label-based forwarding and traffic engineering
c) To assign IP addresses dynamically
d) To translate domain names to IP addresses
Answer: b) To enable label-based forwarding and traffic engineering
26. Which of the following is not a characteristic of Software-
Defined Networking (SDN)?
a) Separation of control plane and data plane
b) Centralized network control
c) Programmability of network behavior
d) Hardware-based packet forwarding decisions
Answer: d) Hardware-based packet forwarding decisions
27. What is the main advantage of using Content Delivery
Networks (CDNs)?
a) To provide end-to-end encryption
b) To reduce latency and improve content availability
c) To assign IP addresses dynamically
d) To prevent DDoS attacks
Answer: b) To reduce latency and improve content availability
28. Which of the following is not a feature of the QUIC
protocol?
a) Reduced connection establishment time
b) Improved congestion control
c) Built-in encryption
d) Guaranteed in-order delivery of all packets
Answer: d) Guaranteed in-order delivery of all packets
29. What is the purpose of the DTLS protocol?
a) To provide security for stream-based protocols like TCP
b) To provide security for datagram-based protocols like UDP
c) To replace TLS in all applications
d) To encrypt routing information in networks
Answer: b) To provide security for datagram-based protocols like
UDP
30. Which of the following best describes the CAP theorem in
distributed systems?
a) Consistency, Availability, Partition tolerance - choose two
b) Consistency, Atomicity, Persistence - choose all three
c) Confidentiality, Authentication, Privacy - choose one
d) Caching, Asynchronous processing, Parallelism - choose two
Answer: a) Consistency, Availability, Partition tolerance - choose two
Set 4
Easy
1. What does IP stand for in the context of networking?
a) Internet Protocol
b) Information Processing
c) Internal Packet
d) Interconnection Point
Answer: a) Internet Protocol
2. Which layer of the OSI model is responsible for data formatting
and encryption?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Presentation Layer
Answer: d) Presentation Layer
3. What is the purpose of a DNS server?
a) To assign IP addresses
b) To translate domain names to IP addresses
c) To encrypt network traffic
d) To route packets between networks
Answer: b) To translate domain names to IP addresses
4. Which of the following is not a valid IP address?
a) 192.168.0.1
b) 10.0.0.1
c) 172.16.0.1
d) 256.0.0.1
Answer: d) 256.0.0.1
5. What is the primary function of a network switch?
a) To connect different networks
b) To forward packets between devices on the same network
c) To assign IP addresses
d) To provide wireless connectivity
Answer: b) To forward packets between devices on the same network
6. Which protocol is used for sending email?
a) HTTP
b) FTP
c) SMTP
d) SSH
Answer: c) SMTP
7. What is the maximum transmission unit (MTU) of a standard
Ethernet frame?
a) 1000 bytes
b) 1500 bytes
c) 2000 bytes
d) 2500 bytes
Answer: b) 1500 bytes
8. Which of the following is not a wireless network standard?
a) Wi-Fi
b) Bluetooth
c) ZigBee
d) Ethernet
Answer: d) Ethernet
9. What is the purpose of DHCP?
a) To assign IP addresses dynamically
b) To encrypt network traffic
c) To translate domain names to IP addresses
d) To route packets between networks
Answer: a) To assign IP addresses dynamically
10. Which layer of the TCP/IP model is responsible for end-to-
end communication?
a) Application Layer
b) Transport Layer
c) Internet Layer
d) Link Layer
Answer: b) Transport Layer
Medium
11. What is the difference between a router and a switch?
a) A router operates at Layer 2, a switch at Layer 3
b) A router connects different networks, a switch connects
devices in the same network
c) A router assigns IP addresses, a switch does not
d) A switch provides wireless connectivity, a router does not
Answer: b) A router connects different networks, a switch connects
devices in the same network
12. Which of the following is not a characteristic of TCP?
a) Connection-oriented
b) Reliable delivery
c) Flow control
d) Connectionless
Answer: d) Connectionless
13. What is the purpose of the TTL field in an IP packet?
a) To indicate the packet's priority
b) To prevent packets from circulating indefinitely
c) To specify the packet's destination
d) To encrypt the packet's contents
Answer: b) To prevent packets from circulating indefinitely
14. Which routing protocol uses the distance vector algorithm?
a) OSPF
b) BGP
c) RIP
d) IS-IS
Answer: c) RIP
15. What is the main purpose of VLAN technology?
a) To increase network speed
b) To segment a network logically
c) To provide wireless connectivity
d) To encrypt network traffic
Answer: b) To segment a network logically
16. Which of the following is not a function of the Network
Layer?
a) Logical addressing
b) Routing
c) Fragmentation
d) Error correction
Answer: d) Error correction
17. What is the purpose of the ARP protocol?
a) To translate domain names to IP addresses
b) To map IP addresses to MAC addresses
c) To encrypt network traffic
d) To assign IP addresses dynamically
Answer: b) To map IP addresses to MAC addresses
18. Which protocol is used for real-time voice communication
over IP networks?
a) HTTP
b) FTP
c) VoIP
d) SMTP
Answer: c) VoIP
19. What is the main difference between unicast and broadcast
transmission?
a) Unicast is faster than broadcast
b) Unicast sends data to a single recipient, broadcast sends to all
devices on the network
c) Unicast uses TCP, broadcast uses UDP
d) Unicast is used for LANs, broadcast is used for WANs
Answer: b) Unicast sends data to a single recipient, broadcast sends to
all devices on the network
20. Which of the following is not a method of network access
control?
a) MAC address filtering
b) 802.1X authentication
c) WPA encryption
d) CSMA/CD
Answer: d) CSMA/CD
Hard
21. What is the purpose of the BGP protocol's MED attribute?
a) To influence inbound traffic
b) To encrypt routing information
c) To specify the destination network
d) To prevent routing loops
Answer: a) To influence inbound traffic
22. Which of the following is not a characteristic of the QUIC
protocol?
a) Reduced connection establishment time
b) Improved congestion control
c) Support for multiplexing
d) Guaranteed delivery of all packets
Answer: d) Guaranteed delivery of all packets
23. What is the main difference between IPsec transport mode
and tunnel mode?
a) Transport mode encrypts only the payload, tunnel mode
encrypts the entire packet
b) Transport mode is faster than tunnel mode
c) Tunnel mode is used for host-to-host communication,
transport mode for network-to-network
d) Transport mode uses AH, tunnel mode uses ESP
Answer: a) Transport mode encrypts only the payload, tunnel mode
encrypts the entire packet
24. Which of the following is not a method used in QoS
(Quality of Service) implementation?
a) Traffic shaping
b) Priority queuing
c) Weighted fair queuing
d) Round-robin scheduling
Answer: d) Round-robin scheduling
25. What is the purpose of the SCTP protocol's multi-
streaming feature?
a) To support multiple IP addresses for a single endpoint
b) To allow independent delivery of multiple data streams
c) To increase the maximum transmission unit (MTU)
d) To provide backward compatibility with TCP
Answer: b) To allow independent delivery of multiple data streams
26. Which of the following is not a characteristic of Software-
Defined Networking (SDN)?
a) Centralized control plane
b) Programmability of network behavior
c) Separation of control and data planes
d) Hardware-based forwarding decisions
Answer: d) Hardware-based forwarding decisions
27. What is the main advantage of using Bloom filters in
network applications?
a) They provide perfect accuracy in membership queries
b) They allow for efficient removal of elements
c) They offer space-efficient probabilistic data structure
d) They guarantee no false positives in membership queries
Answer: c) They offer space-efficient probabilistic data structure
28. Which of the following is not a feature of the MPLS
protocol?
a) Label-based forwarding
b) Traffic engineering capabilities
c) Support for Quality of Service (QoS)
d) End-to-end encryption
Answer: d) End-to-end encryption
29. What is the purpose of the DTLS protocol?
a) To provide security for stream-based protocols like TCP
b) To provide security for datagram-based protocols like UDP
c) To replace TLS in all applications
d) To encrypt routing information in networks
Answer: b) To provide security for datagram-based protocols like
UDP
30. Which of the following best describes the CAP theorem in
distributed systems?
a) Consistency, Availability, Partition tolerance - choose two
b) Consistency, Atomicity, Persistence - choose all three
c) Confidentiality, Authentication, Privacy - choose one
d) Caching, Asynchronous processing, Parallelism - choose two
Answer: a) Consistency, Availability, Partition tolerance - choose two
Set 5
Easy
1. What is the primary purpose of the Physical Layer in the OSI
model?
a) Routing
b) Error detection
c) Bit transmission
d) Flow control
Answer: c) Bit transmission
2. Which of the following is not a guided transmission medium?
a) Twisted pair
b) Coaxial cable
c) Fiber optic
d) Satellite
Answer: d) Satellite
3. What does CSMA/CD stand for?
a) Carrier Sense Multiple Access with Collision Detection
b) Computer Systems Multiple Access with Collision Detection
c) Carrier System Multiple Access with Collision Diversion
d) Computer Sense Multiple Access with Collision Diversion
Answer: a) Carrier Sense Multiple Access with Collision Detection
4. What is the maximum length of an Ethernet frame?
a) 1000 bytes
b) 1500 bytes
c) 2000 bytes
d) 2500 bytes
Answer: b) 1500 bytes
5. Which of the following is not a wireless network standard?
a) Wi-Fi
b) Bluetooth
c) ZigBee
d) Token Ring
Answer: d) Token Ring
6. What is the purpose of DNS?
a) To assign IP addresses
b) To translate domain names to IP addresses
c) To encrypt network traffic
d) To compress data packets
Answer: b) To translate domain names to IP addresses
7. Which layer of the OSI model is responsible for logical
addressing?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
Answer: c) Network Layer
8. What is the default port number for HTTPS?
a) 80
b) 443
c) 8080
d) 21
Answer: b) 443
9. Which of the following is not a function of routers?
a) Packet forwarding
b) Path selection
c) Error correction
d) Address resolution
Answer: c) Error correction
10. What does DHCP stand for?
a) Dynamic Host Configuration Protocol
b) Domain Host Control Protocol
c) Distributed Host Computing Protocol
d) Direct Host Communication Protocol
Answer: a) Dynamic Host Configuration Protocol
Medium
11. What is the purpose of the TTL field in an IP packet?
a) To indicate the packet’s priority
b) To prevent packets from circulating indefinitely
c) To specify the packet’s destination
d) To encrypt the packet’s contents
Answer: b) To prevent packets from circulating indefinitely
12. Which of the following is not a characteristic of TCP?
a) Connection-oriented
b) Reliable delivery
c) Flow control
d) Connectionless
Answer: d) Connectionless
13. What is the main difference between a hub and a switch?
a) A hub is intelligent and a switch is not
b) A switch uses MAC addresses to forward frames, a hub does
not
c) A hub provides full-duplex communication, a switch does not
d) A switch is used for WANs, a hub is used for LANs
Answer: b) A switch uses MAC addresses to forward frames, a hub
does not
14. Which routing protocol uses the distance vector algorithm?
a) OSPF
b) BGP
c) RIP
d) IS-IS
Answer: c) RIP
15. What is the purpose of NAT (Network Address
Translation)?
a) To increase network security
b) To conserve IP addresses
c) To improve network performance
d) To encrypt network traffic
Answer: b) To conserve IP addresses
16. Which of the following is not a method of error detection
in data communication?
a) Parity check
b) Checksum
c) Cyclic Redundancy Check (CRC)
d) Forward Error Correction (FEC)
Answer: d) Forward Error Correction (FEC)
17. What is the main purpose of VLAN technology?
a) To increase network speed
b) To segment a network logically
c) To provide wireless connectivity
d) To encrypt network traffic
Answer: b) To segment a network logically
18. Which protocol is used for secure remote login?
a) HTTP
b) FTP
c) SSH
d) SMTP
Answer: c) SSH
19. What is the purpose of the ARP protocol?
a) To translate domain names to IP addresses
b) To map IP addresses to MAC addresses
c) To encrypt network traffic
d) To assign IP addresses dynamically
Answer: b) To map IP addresses to MAC addresses
20. Which of the following is not a characteristic of IPv6?
a) 128-bit addresses
b) Built-in security features
c) Simplified header format
d) Broadcast support
Answer: d) Broadcast support
Hard
21. What is the purpose of the BGP protocol’s MED attribute?
a) To influence inbound traffic
b) To encrypt routing information
c) To specify the destination network
d) To prevent routing loops
Answer: a) To influence inbound traffic
22. Which of the following is not a characteristic of the QUIC
protocol?
a) Reduced connection establishment time
b) Improved congestion control
c) Support for multiplexing
d) Guaranteed delivery of all packets
Answer: d) Guaranteed delivery of all packets
23. What is the main difference between IPsec transport mode
and tunnel mode?
a) Transport mode encrypts only the payload, tunnel mode
encrypts the entire packet
b) Transport mode is faster than tunnel mode
c) Tunnel mode is used for host-to-host communication,
transport mode for network-to-network
d) Transport mode uses AH, tunnel mode uses ESP
Answer: a) Transport mode encrypts only the payload, tunnel mode
encrypts the entire packet
24. Which of the following is not a method used in QoS
(Quality of Service) implementation?
a) Traffic shaping
b) Priority queuing
c) Weighted fair queuing
d) Round-robin scheduling
Answer: d) Round-robin scheduling
25. What is the purpose of the SCTP protocol’s multi-
streaming feature?
a) To support multiple IP addresses for a single endpoint
b) To allow independent delivery of multiple data streams
c) To increase the maximum transmission unit (MTU)
d) To provide backward compatibility with TCP
Answer: b) To allow independent delivery of multiple data streams
26. Which of the following is not a characteristic of Software-
Defined Networking (SDN)?
a) Centralized control plane
b) Programmability of network behavior
c) Separation of control and data planes
d) Hardware-based forwarding decisions
Answer: d) Hardware-based forwarding decisions
27. What is the main advantage of using Bloom filters in
network applications?
a) They provide perfect accuracy in membership queries
b) They allow for efficient removal of elements
c) They offer space-efficient probabilistic data structure
d) They guarantee no false positives in membership queries
Answer: c) They offer space-efficient probabilistic data structure
28. Which of the following is not a feature of the MPLS
protocol?
a) Label-based forwarding
b) Traffic engineering capabilities
c) Support for Quality of Service (QoS)
d) End-to-end encryption
Answer: d) End-to-end encryption
29. What is the purpose of the DTLS protocol?
a) To provide security for stream-based protocols like TCP
b) To provide security for datagram-based protocols like UDP
c) To replace TLS in all applications
d) To encrypt routing information in networks
Answer: b) To provide security for datagram-based protocols like
UDP
30. In the context of network security, what is the primary
purpose of a honeypot?
a) To encrypt network traffic
b) To detect and deflect unauthorized access attempts
c) To accelerate network performance
d) To compress data packets
Answer: b) To detect and deflect unauthorized access attempts

You might also like