What is the basic purpose of computer networking?
a. To enhance computer performance
b. To connect computers for data sharing and communication
c. To secure computer data
d. To perform complex mathematical calculations
Answer: b. To connect computers for data sharing and communication
What does LAN stand for in computer networking?
a. Local Access Network
b. Large Area Network
c. Local Area Network
d. Long Access Network
Answer: c. Local Area Network
Which of the following is an example of a wireless communication technology used in LANs?
a. Ethernet
b. Bluetooth
c. Fiber optics
d. DSL
Answer: b. Bluetooth
What does WAN stand for in computer networking?
a. Wireless Area Network
b. Wide Area Network
c. Wired Area Network
d. Web Area Network
Answer: b. Wide Area Network
Which network topology connects all devices in a linear sequence?
a. Bus
b. Star
c. Ring
d. Mesh
Answer: a. Bus
What is the purpose of a router in a computer network?
a. To connect devices within a LAN
b. To connect multiple LANs and route data between them
c. To connect devices to the internet
d. To connect a computer to a printer
Answer: b. To connect multiple LANs and route data between them
What is an IP address used for in networking?
a. To identify a specific website
b. To identify a specific computer or device on a network
c. To encrypt data transmitted over the internet
d. To send and receive emails
Answer: b. To identify a specific computer or device on a network
Which of the following is a commonly used protocol for sending emails?
a. HTTP
b. FTP
c. SMTP
d. TCP
Answer: c. SMTP
What does DNS stand for in computer networking?
a. Domain Name System
b. Data Network Server
c. Digital Naming Service
d. Dynamic Network System
Answer: a. Domain Name System
What is the primary role of a router in a computer network?
a) Transmit data within the same network
b) Connect multiple networks together
c) Filter spam emails
d) Execute arithmetic operations
Answer: b) Connect multiple networks together
Which network device operates at the Data Link Layer of the OSI model and forwards data based on MAC addresses?
a. Router
b. Switch
c. Hub
d. Firewall
Answer: b. Switch
What is a firewall used for in network security?
a. To filter and control network traffic based on security rules
b. To speed up internet connections
c. To connect multiple networks together
d. To store and manage network data
Answer: a. To filter and control network traffic based on security rules
Which of the following is an example of a public IP address?
a. 10.0.0.1
b. 172.16.0.1
c. 192.168.0.1
d. 203.0.113.1
Answer: d. 203.0.113.1
What does HTTP stand for in web addresses?
a. HyperText Transfer Protocol
b. Hyperlink and Text Transmission Protocol
c. High-Tech Text Transfer Procedure
d. Hypertext Transfer Privacy
Answer: a. HyperText Transfer Protocol
Which OSI model layer is responsible for routing and forwarding data packets between different networks?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
Answer: c) Network Layer
Which network protocol is used for securely transferring files over a network?
a. HTTP
b. FTP
c. SMTP
d. POP3
Answer: b. FTP
What is the purpose of the ping command in networking?
a. To send email messages
b. To test network connectivity and measure response time
c. To access web pages
d. To transfer files between computers
Answer: b. To test network connectivity and measure response time
Which networking device is used to connect multiple network segments together and operates at the Network Layer of the OSI model?
a. Hub
b. Switch
c. Router
d. Gateway
Answer: c. Router
Which of the following is NOT a top-level domain (TLD) for internet domain names?
a. .com
b. .net
c. .org
d. .exe
Answer: d. .exe
In the context of IP addressing, what is the purpose of subnetting?
a. To divide a network into smaller, more manageable subnetworks
b. To encrypt data transmissions
c. To assign unique IP addresses to devices
d. To filter and block unwanted internet traffic
Answer: a. To divide a network into smaller, more manageable subnetworks
Which network protocol is responsible for translating domain names (e.g., www.example.com) into IP addresses?
a. FTP
b. HTTP
c. DNS
d. SMTP
Answer: c. DNS
Which of the following is NOT a type of network cable?
a. Ethernet cable
b. Fiber optic cable
c. Coaxial cable
d. Bluetooth cable
Answer: d. Bluetooth cable
What is the purpose of NAT (Network Address Translation) in networking?
a. To create virtual private networks (VPNs)
b. To assign unique IP addresses to devices on a private network
c. To map private IP addresses to a single public IP address for internet access
d. To secure email communication
Answer: c. To map private IP addresses to a single public IP address for internet access
Which network protocol is used for real-time voice and video communication over the internet?
a. HTTP
b. SMTP
c. VoIP
d. FTP
Answer: c. VoIP (Voice over Internet Protocol)
What is a DDoS attack in the context of network security?
a. A type of malware
b. A method of encrypting data
c. A distributed denial of service attack that overwhelms a network or website with traffic
d. A type of network cable
Answer: c. A distributed denial of service attack that overwhelms a network or website with traffic
Which of the following is a widely used network operating system?
a. Windows
b. Microsoft Office
c. Adobe Photoshop
d. Skype
Answer: a. Windows
Which networking technology allows devices to communicate over short distances without wires?
a. Ethernet
b. Bluetooth
c. Fiber optics
d. DSL
Answer: b. Bluetooth
What does VoIP stand for in networking?
a. Voice Over Internet Protocol
b. Video Output and Input Protocol
c. Virtual Office Information Processing
d. Virtual Operating and Integration Platform
Answer: a. Voice Over Internet Protocol
What is the purpose of a proxy server in network communication?
a. To route data between different networks
b. To filter and cache web content for improved performance
c. To assign IP addresses to devices on a LAN
d. To secure email communication
Answer: b. To filter and cache web content for improved performance
Which network topology connects all devices to a central hub or switch?
a. Bus
b. Star
c. Ring
d. Mesh
Answer: b. Star
Which network protocol is commonly used for secure remote access to a network?
a. HTTP
b. HTTPS
c. FTP
d. Telnet
Answer: b. HTTPS (Hypertext Transfer Protocol Secure)
What is the purpose of a VPN (Virtual Private Network)?
a. To provide high-speed internet access
b. To filter and block unwanted internet traffic
c. To encrypt and secure communication over a public network
d. To map private IP addresses to public IP addresses
Answer: c. To encrypt and secure communication over a public network
What does IoT stand for in the context of networked devices?
a. Internet of Things
b. Input and Output Technology
c. Integrated Online Testing
d. Internet of Telecommunications
Answer: a. Internet of Things
What is the purpose of a MAC address in networking?
a. To identify a device on the internet
b. To encrypt data transmissions
c. To uniquely identify a network interface controller (NIC)
d. To assign IP addresses to devices
Answer: c. To uniquely identify a network interface controller (NIC)
Which of the following is a wireless communication technology commonly used for connecting IoT devices?
a. Ethernet
b. Zigbee
c. Fiber optics
d. DSL
Answer: b. Zigbee
What is the purpose of a modem in computer networking?
a. To connect multiple LANs
b. To encrypt data transmissions
c. To convert digital data into analog signals for transmission
d. To secure email communication
Answer: c. To convert digital data into analog signals for transmission
Which networking technology allows for high-speed data transmission over existing telephone lines?
a. Ethernet
b. Fiber optics
c. DSL (Digital Subscriber Line)
d. Coaxial cable
Answer: c. DSL (Digital Subscriber Line)
What does SSID stand for in wireless networking?
a. Secure System Identifier
b. Service Set Identifier
c. System Security Identifier
d. Signal Strength Indicator
Answer: b. Service Set Identifier
Which of the following is NOT a commonly used wireless encryption protocol for securing Wi-Fi networks?
a. WEP
b. WPA
c. SSL
d. WPA3
Answer: c. SSL (Secure Sockets Layer)
What is a MAC filtering used for in wireless networking?
a. To filter and block unwanted internet traffic
b. To map private IP addresses to public IP addresses
c. To restrict access to a Wi-Fi network based on MAC addresses
d. To encrypt data transmissions
Answer: c. To restrict access to a Wi-Fi network based on MAC addresses
Which of the following is a commonly used port number for secure web traffic (HTTPS)?
a. 80
b. 25
c. 443
d. 110
Answer: c. 443
What is the purpose of a WEP key in wireless networking?
a. To identify a Wi-Fi network
b. To encrypt data transmissions
c. To assign IP addresses to devices
d. To filter and block internet traffic
Answer: b. To encrypt data transmissions
What is a subnet mask used for in IP addressing?
a. To identify the network portion of an IP address
b. To encrypt data transmissions
c. To assign unique IP addresses to devices
d. To assign DNS server addresses
Answer: a. To identify the network portion of an IP address
Which of the following is NOT a commonly used network port?
a. Port 25 (SMTP)
b. Port 53 (DNS)
c. Port 80 (HTTP)
d. Port 1000 (Bluetooth)
Answer: d. Port 1000 (Bluetooth)
What is the purpose of QoS (Quality of Service) in networking?
a. To prioritize and manage network traffic to ensure a certain level of service quality
b. To secure email communication
c. To assign IP addresses to devices
d. To filter and block internet traffic
Answer: a. To prioritize and manage network traffic to ensure a certain level of service quality
Which network protocol is commonly used for remotely logging into a computer system over a network connection?
a. HTTP
b. FTP
c. SSH
d. POP3
Answer: c. SSH (Secure Shell)
What is the purpose of a VLAN (Virtual LAN) in networking?
a. To create a physical separation between network segments
b. To assign IP addresses to devices
c. To secure email communication
d. To create logical network segments within a physical network
Answer: d. To create logical network segments within a physical network
What does SNMP stand for in network management?
a. Simple Network Management Protocol
b. Secure Network Management Protocol
c. System Network Management Procedure
d. Structured Network Monitoring Protocol
Answer: a. Simple Network Management Protocol
Which of the following is a commonly used protocol for retrieving email messages from a mail server?
a. SMTP
b. POP3
c. IMAP
d. HTTP
Answer: b. POP3 (Post Office Protocol version 3)
In networking, what is the purpose of NAT (Network Address Translation)?
a. To assign public IP addresses to devices
b. To map private IP addresses to a single public IP address
c. To encrypt data transmissions
d. To assign MAC addresses to devices
Answer: b. To map private IP addresses to a single public IP address
Which of the following is NOT a commonly used network top-level domain (TLD)?
a. .com
b. .net
c. .org
d. .exe
Answer: d. .exe
What is the purpose of a MAC (Media Access Control) address in networking?
a. To identify a device on the internet
b. To filter and block internet traffic
c. To uniquely identify a network interface controller (NIC)
d. To encrypt data transmissions
Answer: c. To uniquely identify a network interface controller (NIC)
Comments
Post a Comment