1. Which protocol is used to assign IP addresses automatically to devices on a network?
o a) TCP
o b) DHCP
o c) DNS
o d) HTTP
Answer: b) DHCP
2. What is the maximum size of an IPv4 address?
o a) 32 bits
o b) 64 bits
o c) 128 bits
o d) 256 bits
Answer: a) 32 bits
3. Which layer of the OSI model is responsible for error detection and correction?
o a) Data Link
o b) Network
o c) Transport
o d) Session
Answer: a) Data Link
4. What is the default subnet mask for a Class C IP address?
o a) 255.0.0.0
o b) 255.255.0.0
o c) 255.255.255.0
o d) 255.255.255.255
Answer: c) 255.255.255.0
5. Which of the following is a connection-oriented protocol?
o a) UDP
o b) ICMP
o c) TCP
o d) IP
Answer: c) TCP
6. What does DNS stand for in networking?
o a) Digital Network System
o b) Domain Name Service
o c) Distributed Network System
o d) Domain Name System
Answer: d) Domain Name System
7. Which port number is used by HTTPS?
o a) 80
o b) 443
o c) 21
o d) 8080
Answer: b) 443
8. Which device operates at the network layer of the OSI model?
o a) Router
o b) Switch
o c) Hub
o d) Repeater
Answer: a) Router
9. Which of the following is a routing protocol?
o a) FTP
o b) RIP
o c) HTTP
o d) SMTP
Answer: b) RIP
10. What does the acronym NAT stand for?
o a) Network Address Translation
o b) Network Access Translation
o c) Network Address Transmission
o d) None of the above
Answer: a) Network Address Translation
11. Which protocol provides reliable, ordered, and error-checked delivery of data?
o a) UDP
o b) TCP
o c) IP
o d) FTP
Answer: b) TCP
12. Which device is used to segment a network into multiple collision domains?
o a) Hub
o b) Switch
o c) Repeater
o d) Bridge
Answer: b) Switch
13. What is the purpose of ARP in networking?
o a) To resolve IP addresses to MAC addresses
o b) To resolve domain names to IP addresses
o c) To establish a secure connection
o d) To route packets across the network
Answer: a) To resolve IP addresses to MAC addresses
14. Which command is used to check the connectivity between two devices in a network?
o a) tracert
o b) ipconfig
o c) ping
o d) telnet
Answer: c) ping
15. What does VLAN stand for?
o a) Virtual Local Area Network
o b) Virtual LAN
o c) Very Large Area Network
o d) Virtual Loopback Area Network
Answer: a) Virtual Local Area Network
1. Which protocol is used for email services?
o a) FTP
o b) SMTP
o c) HTTP
o d) SNMP
Answer: b) SMTP
2. Which device forwards data based on MAC addresses?
o a) Router
o b) Switch
o c) Hub
o d) Repeater
Answer: b) Switch
3. Which protocol resolves IP addresses to MAC addresses?
o a) DNS
o b) DHCP
o c) ARP
o d) RARP
Answer: c) ARP
4. Which layer in the OSI model deals with logical addressing?
o a) Data Link
o b) Network
o c) Transport
o d) Application
Answer: b) Network
5. Which layer of the OSI model establishes, manages, and terminates connections?
o a) Application
o b) Presentation
o c) Session
o d) Transport
Answer: c) Session
6. Which of the following is a Class B IP address?
o a) 192.168.1.1
o b) 172.16.0.1
o c) 10.0.0.1
o d) 224.0.0.1
Answer: b) 172.16.0.1
7. What is the range of Class A IP addresses?
o a) 1.0.0.0 to 126.255.255.255
o b) 128.0.0.0 to 191.255.255.255
o c) 192.0.0.0 to 223.255.255.255
o d) 224.0.0.0 to 239.255.255.255
Answer: a) 1.0.0.0 to 126.255.255.255
8. Which layer of the OSI model handles flow control and error control?
o a) Data Link
o b) Transport
o c) Session
o d) Network
Answer: b) Transport
9. What is the primary function of a firewall?
o a) To encrypt data
o b) To filter traffic
o c) To forward packets
o d) To perform NAT
Answer: b) To filter traffic
10. Which layer in the OSI model is responsible for end-to-end communication?
o a) Application
o b) Presentation
o c) Transport
o d) Session
Answer: c) Transport
11. What is the purpose of the TCP three-way handshake?
o a) To establish a secure connection
o b) To terminate a connection
o c) To establish a reliable connection
o d) To route data
Answer: c) To establish a reliable connection
12. Which device is used to divide a network into multiple subnetworks?
o a) Router
o b) Switch
o c) Hub
o d) Repeater
Answer: a) Router
13. Which transport layer protocol is used by DNS?
o a) TCP
o b) UDP
o c) ICMP
o d) FTP
Answer: b) UDP
14. Which protocol is used for secure web communication?
o a) HTTP
o b) HTTPS
o c) FTP
o d) SMTP
Answer: b) HTTPS
15. Which protocol operates at the application layer of the OSI model?
o a) IP
o b) TCP
o c) FTP
o d) ARP
Answer: c) FTP
16. Which protocol is used for file transfer over the internet?
o a) FTP
o b) SMTP
o c) DNS
o d) SNMP
Answer: a) FTP
17. What is the full form of FTP?
o a) File Transfer Protocol
o b) File Transmission Protocol
o c) File Translate Protocol
o d) File Transform Protocol
Answer: a) File Transfer Protocol
18. Which of the following is not a routing protocol?
o a) OSPF
o b) BGP
o c) RIP
o d) HTTP
Answer: d) HTTP
19. Which protocol does a web browser use to access a web page?
o a) FTP
o b) HTTP
o c) SMTP
o d) SNMP
Answer: b) HTTP
20. Which port is used for FTP data transfer?
o a) 21
o b) 23
o c) 25
o d) 20
Answer: d) 20
21. Which topology is most efficient for small networks?
o a) Star
o b) Bus
o c) Ring
o d) Mesh
Answer: a) Star
22. What is the size of an IPv6 address?
o a) 32 bits
o b) 64 bits
o c) 128 bits
o d) 256 bits
Answer: c) 128 bits
23. Which of the following is a connectionless protocol?
o a) TCP
o b) UDP
o c) FTP
o d) SMTP
Answer: b) UDP
24. Which layer in the OSI model provides encryption and decryption?
o a) Transport
o b) Application
o c) Presentation
o d) Session
Answer: c) Presentation
25. What is the purpose of the ICMP protocol?
o a) To send error messages
o b) To encrypt data
o c) To establish a connection
o d) To transfer files
Answer: a) To send error messages
26. Which network topology has a single point of failure?
o a) Star
o b) Bus
o c) Mesh
o d) Ring
Answer: b) Bus
27. Which of the following protocols is used for remote login?
o a) FTP
o b) HTTP
o c) Telnet
o d) SMTP
Answer: c) Telnet
28. Which device is used to connect different networks?
o a) Hub
o b) Router
o c) Switch
o d) Repeater
Answer: b) Router
29. What is the size of a MAC address?
o a) 32 bits
o b) 48 bits
o c) 64 bits
o d) 128 bits
Answer: b) 48 bits
30. Which command is used to display the routing table in a computer?
o a) ipconfig
o b) ping
o c) tracert
o d) netstat
Answer: d) netstat
31. What is the purpose of a proxy server?
o a) To monitor network traffic
o b) To cache web content
o c) To block unauthorized access
o d) To transfer files
Answer: b) To cache web content
32. Which protocol is used to monitor network devices?
o a) HTTP
o b) SNMP
o c) FTP
o d) SSH
Answer: b) SNMP
33. Which layer of the OSI model deals with routing of packets?
o a) Transport
o b) Network
o c) Data Link
o d) Physical
Answer: b) Network
34. What does SSL stand for?
o a) Secure Sockets Layer
o b) Secure Software Layer
o c) System Socket Layer
o d) Secure Session Layer
Answer: a) Secure Sockets Layer
35. Which protocol is used to dynamically assign IP addresses to devices?
o a) DHCP
o b) DNS
o c) ARP
o d) ICMP
Answer: a) DHCP
36. What is the function of a switch in networking?
o a) To forward packets based on MAC addresses
o b) To connect two different networks
o c) To act as a wireless access point
o d) To provide internet access
Answer: a) To forward packets based on MAC addresses
37. Which network layer protocol is used for congestion control?
o a) TCP
o b) IP
o c) UDP
o d) ARP
Answer: a) TCP
38. What does the command 'ping' check in networking?
o a) Data transmission speed
o b) Internet connectivity
o c) Packet loss
o d) Round-trip time
Answer: d) Round-trip time
39. Which device is used to amplify a signal in a network?
o a) Router
o b) Hub
o c) Repeater
o d) Switch
Answer: c) Repeater
40. Which protocol is used to securely transfer files over a network?
o a) FTP
o b) SFTP
o c) TFTP
o d) HTTP
Answer: b) SFTP
41. Which port is used by Telnet for communication?
o a) 21
o b) 23
o c) 25
o d) 80
Answer: b) 23
42. What is the purpose of the DNS protocol?
o a) To resolve domain names to IP addresses
o b) To assign dynamic IP addresses
o c) To monitor network traffic
o d) To encrypt data
Answer: a) To resolve domain names to IP addresses
43. Which protocol is responsible for error reporting in the network?
o a) ARP
o b) ICMP
o c) TCP
o d) UDP
Answer: b) ICMP
44. Which of the following is a distance-vector routing protocol?
o a) OSPF
o b) RIP
o c) EIGRP
o d) BGP
Answer: b) RIP
45. What does TCP stand for in networking?
o a) Transmission Control Protocol
o b) Transfer Control Protocol
o c) Transport Communication Protocol
o d) Transmission Communication Protocol
Answer: a) Transmission Control Protocol
46. Which port is used by DNS for communication?
o a) 23
o b) 53
o c) 80
o d) 443
Answer: b) 53
47. Which layer of the OSI model does the IP protocol operate in?
o a) Data Link
o b) Network
o c) Transport
o d) Session
Answer: b) Network
48. Which of the following protocols is used for network management?
o a) HTTP
o b) SNMP
o c) SMTP
o d) DHCP
Answer: b) SNMP
49. What is the purpose of the NAT protocol?
o a) To route packets
o b) To translate private IP addresses to public IP addresses
o c) To assign dynamic IP addresses
o d) To encrypt data
Answer: b) To translate private IP addresses to public IP addresses
50. Which protocol is used for time synchronization in a network?
o a) NTP
o b) FTP
o c) HTTP
o d) DNS
Answer: a) NTP
51-100: Advanced Networking Concepts
51. Which routing algorithm finds the shortest path in a network?
o a) Distance Vector
o b) Link State
o c) Hybrid
o d) Static
Answer: b) Link State
52. Which protocol is used to send a query to a DNS server?
o a) TCP
o b) UDP
o c) ICMP
o d) RIP
Answer: b) UDP
53. What is the maximum length of a cable in a 100BASE-T network?
o a) 50 meters
o b) 100 meters
o c) 200 meters
o d) 500 meters
Answer: b) 100 meters
54. Which device is used to connect wireless devices to a wired network?
o a) Router
o b) Switch
o c) Access Point
o d) Hub
Answer: c) Access Point
55. Which routing protocol uses a hierarchical structure?
o a) OSPF
o b) RIP
o c) BGP
o d) EIGRP Answer: a) OSPF
56. What is the default port number for HTTP?
o a) 21
o b) 80
o c) 443
o d) 8080 Answer: b) 80
57. What is the default port number for HTTPS?
o a) 80
o b) 443
o c) 21
o d) 23 Answer: b) 443
58. What is the function of the Spanning Tree Protocol (STP)?
o a) To prevent loops in a network
o b) To encrypt data
o c) To route packets
o d) To assign IP addresses
Answer: a) To prevent loops in a network
59. Which type of routing protocol is EIGRP?
o a) Link State
o b) Distance Vector
o c) Hybrid
o d) Static Answer: c) Hybrid
o
60. What is the maximum number of hops allowed in a RIP network?
o a) 10
o b) 15
o c) 20
o d) 25
Answer: b) 15
61. What is the primary purpose of a VPN?
o a) To encrypt network traffic
o b) To monitor network performance
o c) To create a secure connection over a public network
o d) To route packets
Answer: c) To create a secure connection over a public network
62. Which layer of the OSI model is responsible for data encryption?
o a) Application
o b) Presentation
o c) Network
o d) Transport
Answer: b) Presentation
63. Which protocol is used to retrieve emails from a mail server?
o a) SMTP
o b) POP3
o c) FTP
o d) HTTP
Answer: b) POP3
64. Which command is used to display the current IP address of a computer?
o a) ping
o b) ipconfig
o c) tracert
o d) netstat
Answer: b) ipconfig
65. Which command is used to trace the route to a remote host?
o a) ping
o b) tracert
o c) ipconfig
o d) netstat
Answer: b) tracert
66. What is the maximum number of IP addresses in a Class C network?
o a) 254
o b) 510
o c) 1024
o d) 2048
Answer: a) 254
67. What is the primary purpose of the BGP protocol?
o a) To encrypt data
o b) To monitor network devices
o c) To route packets between autonomous systems
o d) To assign IP addresses
Answer: c) To route packets between autonomous systems
68. Which layer of the OSI model is responsible for packet fragmentation?
o a) Transport
o b) Network
o c) Data Link
o d) Physical
Answer: b) Network
69. Which protocol is used to transfer files between hosts without requiring authentication?
o a) FTP
o b) TFTP
o c) SFTP
o d) HTTP
Answer: b) TFTP
70. What does QoS stand for?
o a) Quality of Service
o b) Query of Service
o c) Queue of Services
o d) Quality of Security Answer: a) Quality of Service
71. Which command is used to display the ARP table in a computer?
o a) ping
o b) arp -a
o c) tracert
o d) netstat Answer: b) arp -a
72. Which protocol is used to synchronize the time between devices on a network?
o a) SMTP
o b) NTP
o c) SNMP
o d) FTP
Answer: b) NTP
73. Which routing protocol is used for inter-domain routing on the internet?
o a) RIP
o b) OSPF
o c) EIGRP
o d) BGP
Answer: d) BGP
74. What is the maximum number of IP addresses in a Class B network?
o a) 65534
o b) 32768
o c) 131072
o d) 262144
Answer: a) 65534
75. Which protocol is used to discover network devices and services on a local network?
o a) DNS
o b) DHCP
o c) LLDP
o d) FTP
Answer: c) LLDP
76. Which type of attack attempts to overwhelm a network with a large amount of traffic?
o a) DDoS
o b) Man-in-the-middle
o c) Phishing
o d) Spoofing
Answer: a) DDoS
77. Which protocol is used to manage network devices remotely?
o a) HTTP
o b) SSH
o c) FTP
o d) SMTP
Answer: b) SSH
78. Which protocol is used to send email over the internet?
o a) FTP
o b) HTTP
o c) SMTP
o d) SNMP
Answer: c) SMTP
79. Which type of IP address is automatically assigned by a DHCP server?
o a) Static
o b) Dynamic
o c) Public
o d) Private
Answer: b) Dynamic
80. What does TTL stand for in networking?
o a) Time to Live
o b) Transfer to Live
o c) Time to Lease
o d) Transport to Live
Answer: a) Time to Live
81. Which protocol is responsible for routing multicast traffic?
o a) RIP
o b) OSPF
o c) IGMP
od) EIGRP
Answer: c) IGMP
82. Which command is used to test the reachability of a host on a network?
o a) ping
o b) ipconfig
o c) tracert
o d) netstat
Answer: a) ping
83. Which type of firewall filters traffic based on port numbers?
o a) Packet-filtering firewall
o b) Stateful firewall
o c) Proxy firewall
o d) Next-generation firewall
Answer: a) Packet-filtering firewall
84. Which protocol is used for directory services in a network?
o a) LDAP
o b) DNS
o c) DHCP
od) FTP
Answer: a) LDAP
85. Which command is used to display the MAC address of a computer?
o a) ping
o b) ipconfig /all
o c) tracert
o d) netstat Answer: b) ipconfig /all
86. Which protocol is used to automatically configure network devices with IP addresses?
o a) DNS
o b) DHCP
o c) FTP
o d) HTTP
Answer: b) DHCP
87. Which protocol is used to secure web traffic?
o a) FTP
o b) HTTP
o c) HTTPS
o d) SMTP
Answer: c) HTTPS
88. Which protocol is used for network time synchronization?
o a) FTP
o b) NTP
o c) SNMP
o d) DNS
Answer: b) NTP
89. Which type of firewall can track the state of network connections?
o a) Packet-filtering firewall
o b) Stateful firewall
o c) Proxy firewall
o d) Next-generation firewall
Answer: b) Stateful firewall
90. Which protocol is used to monitor network devices?
o a) HTTP
o b) SNMP
o c) FTP
o d) SMTP
Answer: b) SNMP
91. Which command is used to display network statistics?
o a) ping
o b) ipconfig
o c) tracert
o d) netstat
Answer: d) netstat
92. Which protocol is used to securely transfer files over a network?
o a) FTP
o b) SFTP
o c) TFTP
o d) HTTP
Answer: b) SFTP
93. Which protocol is used to manage network devices?
o a) SNMP
o b) FTP
o c) HTTP
o d) SMTP Answer: a) SNMP
94. Which type of network is used to connect devices within a small geographic area?
o a) WAN
o b) LAN
o c) MAN
o d) PAN Answer: b) LAN
95. Which protocol is used for dynamic routing between networks?
o a) RIP
o b) OSPF
o c) BGP
o d) EIGRP Answer: a) RIP
96. Which command is used to display the routing table on a computer?
o a) ping
o b) tracert
o c) route print
o d) netstat Answer: c) route print
97. Which protocol is used to assign IP addresses automatically?
o a) DNS
o b) DHCP
o c) ARP
o d) FTP
Answer: b) DHCP
98. Which type of attack attempts to gain unauthorized access to a network?
o a) Spoofing
o b) Phishing
o c) Brute force
o d) Man-in-the-middle
Answer: a) Spoofing
99. Which protocol is used for encrypted communication between devices?
o a) FTP
o b) HTTP
o c) SSH
o d) SNMP
Answer: c) SSH
100. Which type of network device is used to forward packets between different networks? - a) Switch
- b) Router
- c) Hub
- d) Repeater
Answer: b) Router
101. Which of the following is a symmetric encryption algorithm? - a) RSA
- b) AES
- c) DSA
- d) ECC
Answer: b) AES
102. Which protocol is used to resolve domain names to IP addresses? - a) DNS
- b) DHCP
- c) SNMP
- d) ARP
Answer: a) DNS
103. Which network topology provides the highest redundancy? - a) Star
- b) Ring
- c) Mesh
- d) Bus
Answer: c) Mesh
104. Which device is used to connect multiple devices in a network? - a) Router
- b) Switch
- c) Hub
- d) Repeater
Answer: b) Switch
105. What is the primary function of a network firewall? - a) To filter incoming and outgoing traffic
- b) To encrypt network traffic
- c) To route packets
- d) To monitor network performance
Answer: a) To filter incoming and outgoing traffic
106. Which protocol is used to encrypt web traffic? - a) HTTP
- b) FTP
- c) HTTPS
- d) SNMP
Answer: c) HTTPS
107. Which command is used to test the reachability of a network device? - a) ping
- b) ipconfig
- c) tracert
- d) netstat
Answer: a) ping
108. Which layer of the OSI model is responsible for data encryption? - a) Network
- b) Transport
- c) Presentation
- d) Session
Answer: c) Presentation
109. Which protocol is used to establish a secure connection between devices? - a) FTP
- b) SSH
- c) SNMP
- d) SMTP
Answer: b) SSH
110. Which command is used to display network statistics on a computer? - a) ping
- b) ipconfig
- c) tracert
- d) netstat Answer: d) netstat
111. Which protocol is used to send email messages? - a) FTP
- b) SMTP
- c) SNMP
- d) HTTP Answer: b) SMTP
112. Which protocol is used to secure remote login? - a) FTP
- b) SSH
- c) HTTP
- d) SNMP
Answer: b) SSH
113. Which type of attack involves intercepting communication between two parties? - a) Spoofing
- b) Phishing
- c) Man-in-the-middle
- d) Brute force
Answer: c) Man-in-the-middle
114. Which protocol is used to securely transfer files over a network? - a) FTP
- b) SFTP
- c) TFTP
- d) HTTP
Answer: b) SFTP
115. Which command is used to display the MAC address of a network interface? - a) ping
- b) ipconfig /all
- c) tracert
- d) netstat
Answer: b) ipconfig /all
116. Which type of network connects devices within a single building or campus? - a) WAN
- b) LAN
- c) MAN
- d) PAN
Answer: b) LAN