knowt logo

Networking

Networking MCQs Flashcards

Question 1

Which of the following topologies is most suited for fault-tolerant networks but may require the most cabling?

  • a) Bus topology

  • b) Ring topology

  • c) Star topology

  • d) Mesh topology


Question 2

In which type of network topology does each node connect to a central hub?

  • a) Ring topology

  • b) Star topology

  • c) Bus topology

  • d) Mesh topology


Question 3

Which transmission medium is least affected by electromagnetic interference?

  • a) Twisted-pair cable

  • b) Coaxial cable

  • c) Optical fiber

  • d) Satellite signals


Question 4

Which device operates at the network layer of the OSI model and helps to determine the best path for data to travel?

  • a) Switch

  • b) Hub

  • c) Router

  • d) Repeater


Question 5

What is the primary difference between a hub and a switch in networking?

  • a) A hub uses MAC addresses, while a switch uses IP addresses.

  • b) A switch transmits data in broadcast mode, while a hub transmits in unicast mode.

  • c) A hub forwards data to all connected devices, while a switch forwards data to specific devices.

  • d) A hub operates at Layer 3 of the OSI model, while a switch operates at Layer 2.


Question 6

Which of the following is not a characteristic of TCP (Transmission Control Protocol)?

  • a) Reliable data transmission

  • b) Flow control

  • c) Connection-oriented

  • d) Unreliable delivery


Question 7

Which protocol is primarily responsible for assigning IP addresses in a network?

  • a) DNS

  • b) DHCP

  • c) HTTP

  • d) FTP


Question 8

Which of the following is a type of malware that locks your files and demands a ransom to restore access?

  • a) Virus

  • b) Worm

  • c) Trojan horse

  • d) Ransomware


Question 9

What does a firewall primarily do in the context of network security?

  • a) Encrypt data for secure transmission

  • b) Detect and remove malware

  • c) Control incoming and outgoing network traffic based on predetermined rules

  • d) Monitor real-time data traffic to identify potential threats


Question 10

Which type of cyberattack involves overwhelming a network with a flood of traffic, making services unavailable?

  • a) Phishing

  • b) Man-in-the-middle attack

  • c) Distributed Denial of Service (DDoS)

  • d) SQL Injection


Question 11

Which of the following is true for a bus topology?

  • a) It provides the most fault tolerance.

  • b) It has a single point of failure at the central hub.

  • c) It uses a single backbone cable to connect all devices.

  • d) It is the most secure topology.


Question 12

Which transmission medium provides the highest bandwidth for long-distance communication?

  • a) Twisted-pair cable

  • b) Coaxial cable

  • c) Optical fiber

  • d) Wireless radio waves


Question 13

What layer of the OSI model is responsible for encryption and decryption of data?

  • a) Data Link Layer

  • b) Transport Layer

  • c) Session Layer

  • d) Presentation Layer


Question 14

Which of the following is NOT a type of network topology?

  • a) Mesh

  • b) Hybrid

  • c) Bus

  • d) Repeater


Question 15

What is the primary purpose of a DNS (Domain Name System)?

  • a) To translate domain names to IP addresses

  • b) To assign MAC addresses to devices

  • c) To encrypt internet traffic

  • d) To provide fault tolerance in a network


Question 16

Which device is used to connect different networks together?

  • a) Hub

  • b) Repeater

  • c) Switch

  • d) Router


Question 17

Which of the following uses time division multiplexing (TDM) for transmission?

  • a) Fiber-optic cables

  • b) Ethernet cables

  • c) Satellite communication

  • d) Token Ring network


Question 18

Which OSI layer ensures error-free data transmission between adjacent nodes?

  • a) Physical Layer

  • b) Network Layer

  • c) Data Link Layer

  • d) Transport Layer


Question 19

Which device breaks up collision domains but not broadcast domains?

  • a) Hub

  • b) Switch

  • c) Router

  • d) Repeater


Question 20

Which type of IP address is non-routable and used within private networks?

  • a) Public IP address

  • b) Private IP address

  • c) Dynamic IP address

  • d) Static IP address


Question 21

Which of the following is NOT a secure wireless protocol?

  • a) WPA2

  • b) WEP

  • c) WPA

  • d) WPA3


Question 22

What is the primary advantage of using fiber-optic cables over copper cables?

  • a) Higher flexibility

  • b) Resistance to electromagnetic interference

  • c) Easier to install

  • d) Lower cost


Question 23

Which of the following protocols is used for secure file transfer over the internet?

  • a) HTTP

  • b) FTP

  • c) SFTP

  • d) DHCP


Question 24

What is the function of ARP (Address Resolution Protocol)?

  • a) To assign IP addresses to devices

  • b) To resolve MAC addresses from IP addresses

  • c) To route data between different networks

  • d) To encrypt network traffic


Question 25

Which network device operates at both Layer 2 and Layer 3 of the OSI model?

  • a) Hub

  • b) Switch

  • c) Repeater

  • d) Router


Question 26

In which type of cyberattack does an attacker intercept communications between two parties?

  • a) Phishing

  • b) Man-in-the-middle attack

  • c) Denial of Service

  • d) Ransomware


Question 27

Which of the following is a technique to break down a large network into smaller, more manageable subnetworks?

  • a) Fragmentation

  • b) Subnetting

  • c) Virtualization

  • d) Encryption


Question 28

Which port number is used by HTTPS?

  • a) 21

  • b) 22

  • c) 443

  • d) 80


Question 29

Which of the following protocols allows remote access to a computer using a secure connection?

  • a) Telnet

  • b) SSH

  • c) HTTP

  • d) POP3


Question 30

Which of the following is a key feature of a VPN (Virtual Private Network)?

  • a) It improves internet speed.

  • b) It provides encryption and anonymity for users.

  • c) It blocks all types of malware.

  • d) It acts as a firewall.


Question 31

Which of the following is NOT a function of a router?

  • a) Traffic forwarding

  • b) Packet switching

  • c) Network segmentation

  • d) Data encryption


Question 32

What does IPsec (Internet Protocol Security) provide in a network?

  • a) Data integrity and confidentiality

  • b) Faster data transmission

  • c) Dynamic IP addressing

  • d) Network address translation


Question 33

Which of the following protocols is responsible for ensuring data is delivered without errors and in the correct sequence?

  • a) UDP

  • b) FTP

  • c) TCP

  • d) IP


Question 34

Which cybersecurity attack involves a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity?

  • a) Phishing

  • b) DDoS

  • c) Brute force attack

  • d) Keylogging


Question 35

Which device amplifies and regenerates signals to extend the distance of a network?

  • a) Switch

  • b) Hub

  • c) Repeater

  • d) Router


Question 36

Which of the following is true about a peer-to-peer network?

  • a) It requires a central server for communication.

  • b) It is highly scalable for large networks.

  • c) All devices have equal privileges.

  • d) It provides better security than a client-server network.


Question 37

Which malware type disguises itself as legitimate software but performs harmful actions in the background?

  • a) Virus

  • b) Worm

  • c) Trojan horse

  • d) Ransomware


Question 38

Which of the following can provide an added layer of security by allowing or denying traffic based on policies?

  • a) Router

  • b) Firewall

  • c) Hub

  • d) Switch


Question 39

What is the purpose of NAT (Network Address Translation)?

  • a) To assign private IP addresses to devices

  • b) To allow multiple devices to share a single public IP address

  • c) To encrypt traffic on public networks

  • d) To establish VPN connections


Question 40

Which of the following attacks exploits a vulnerability in databases by inserting malicious code?

  • a) SQL injection

  • b) Phishing

  • c) DDoS attack

  • d) Keylogging


Question 41

What role does the Transport Layer of the OSI model play in networking?

  • a) Provides error checking and flow control

  • b) Defines hardware specifications for network communication

  • c) Routes packets across different networks

  • d) Encrypts data during transmission


Question 42

Which of the following protocols is commonly used for sending email?

  • a) FTP

  • b) SMTP

  • c) IMAP

  • d) HTTP


Question 43

What does a honeypot in cybersecurity refer to?

  • a) A malicious server used to attack hackers

  • b) A system set up to attract attackers and study their methods

  • c) A secure network node to redirect traffic

  • d) An encrypted database storing sensitive data


Question 44

Which term refers to the unauthorized access of network resources?

  • a) Hacking

  • b) Phishing

  • c) Encryption

  • d) VPN


Question 45

What is the primary function of a VLAN (Virtual Local Area Network)?

  • a) Provides secure remote access

  • b) Segments a network into smaller, isolated sections

  • c) Encrypts all network traffic

  • d) Reduces bandwidth usage


Question 46

Which of the following is a principle of the CIA triad in cybersecurity?

  • a) Access control

  • b) Integrity

  • c) Non-repudiation

  • d) Redundancy


Question 47

Which of the following is a distributed computing framework for processing large datasets?

  • a) OSI model

  • b) Hadoop

  • c) SMTP

  • d) DHCP


Question 48

What is the main purpose of a proxy server?

  • a) To encrypt communications

  • b) To forward requests and responses between clients and servers

  • c) To act as a firewall

  • d) To directly transfer files between computers


Question 49

Which cybersecurity practice involves identifying weaknesses in a network before attackers can exploit them?

  • a) Phishing

  • b) Penetration testing

  • c) Ransomware

  • d) Social engineering


Question 50

Which of the following protocols is used for securing communication over a computer network?

  • a) HTTP

  • b) FTP

  • c) IPsec

  • d) DHCP


Question 51

Which network security tool monitors traffic in real time to detect suspicious activity?

  • a) Firewall

  • b) IDS (Intrusion Detection System)

  • c) Router

  • d) NAT


Question 52

Which of the following is an attack that attempts to crack encrypted data by trying every possible combination?

  • a) Brute force attack

  • b) Phishing

  • c) DDoS attack

  • d) Malware injection


Question 53

Which of the following cybersecurity principles ensures that data has not been altered or tampered with?

  • a) Confidentiality

  • b) Integrity

  • c) Availability

  • d) Redundancy


Question 54

Which of the following protocols is used for downloading emails from a server to a local client?

  • a) SMTP

  • b) IMAP

  • c) FTP

  • d) DNS


Question 55

Which type of malware replicates itself without any human intervention?

  • a) Virus

  • b) Worm

  • c) Trojan horse

  • d) Spyware


Question 56

What is the primary difference between UDP and TCP?

  • a) TCP is connection-oriented, while UDP is connectionless.

  • b) UDP ensures reliable data transfer, while TCP does not.

  • c) UDP operates at the Data Link Layer, while TCP operates at the Network Layer.

  • d) TCP is faster than UDP.


Question 57

Which of the following is an advantage of IPv6 over IPv4?

  • a) Shorter addresses

  • b) Larger address space

  • c) Less secure protocol

  • d) Faster data transmission


Question 58

Which of the following security measures prevents unauthorized access to a network?

  • a) MAC filtering

  • b) ARP spoofing

  • c) DHCP snooping

  • d) Subnetting


Question 59

What is a key characteristic of a cloud-based network?

  • a) All data is stored locally.

  • b) Services are available over the internet.

  • c) It requires specialized hardware.

  • d) It is slower than traditional networks.


Question 60

Which of the following refers to a system that automatically detects and responds to security incidents in real-time?

  • a) IDS

  • b) IPS (Intrusion Prevention System)

  • c) Proxy server

  • d) NAT


Question 61

What is the primary function of a Network Interface Card (NIC)?

  • a) Connect multiple computers in a LAN

  • b) Convert analog signals to digital

  • c) Connect a computer to a network

  • d) Amplify weak signals in a network


Question 62

Which device converts digital data to analog signals for transmission over telephone lines?

  • a) Hub

  • b) Repeater

  • c) Modem

  • d) Router


Question 63

What type of connector is typically used for connecting computers in a LAN using twisted-pair cables?

  • a) RJ-11

  • b) RJ-45

  • c) HDMI

  • d) USB


Question 64

Which device is commonly used to regenerate weak signals in a network?

  • a) Switch

  • b) Hub

  • c) Repeater

  • d) Gateway


Question 65

What is a significant disadvantage of using a hub in a network?

  • a) It broadcasts data to all connected devices.

  • b) It only supports wireless networks.

  • c) It only connects two devices.

  • d) It is too expensive to deploy.


Question 66

Which device intelligently forwards data only to the intended recipient in a network?

  • a) Hub

  • b) Switch

  • c) Repeater

  • d) Router


Question 67

A wireless access point (WAP) allows devices to connect to a network using which technology?

  • a) Bluetooth

  • b) Wi-Fi

  • c) Ethernet

  • d) Coaxial cables


Question 68

Which device is used to connect two different types of networks?

  • a) Hub

  • b) Switch

  • c) Router

  • d) Gateway


Question 69

Which of the following is an example of wired transmission media?

  • a) Radio waves

  • b) Optical fiber

  • c) Infrared waves

  • d) Microwaves


Question 70

What type of transmission media is best suited for long-distance, high-bandwidth communication?

  • a) Coaxial cable

  • b) Twisted-pair cable

  • c) Optical fiber

  • d) Radio waves


Question 71

Which cable is made of copper and is twisted to reduce interference?

  • a) Coaxial cable

  • b) Optical fiber cable

  • c) Twisted-pair cable

  • d) Ethernet cable


Question 72

Which of the following is NOT an example of wireless transmission media?

  • a) Microwave

  • b) Optical fiber

  • c) Infrared waves

  • d) Satellite link


Question 73

Which transmission media has the highest resistance to electromagnetic interference (EMI)?

  • a) Twisted-pair cable

  • b) Coaxial cable

  • c) Optical fiber cable

  • d) Microwave signals


Question 74

What is the main disadvantage of using optical fiber cables?

  • a) Low bandwidth

  • b) High cost and complexity

  • c) Susceptibility to electromagnetic interference

  • d) Limited range


Question 75

Which wireless technology is used in short-range communication, like remote controls and wireless mice?

  • a) Microwave

  • b) Infrared

  • c) Radio waves

  • d) Satellite


Question 76

What is the main function of a repeater in a network?

  • a) Convert digital data to analog

  • b) Amplify and regenerate weak signals

  • c) Distribute IP addresses

  • d) Route data between different networks


Question 77

Which type of cable is commonly used in television signal transmission?

  • a) Coaxial cable

  • b) Twisted-pair cable

  • c) Optical fiber cable

  • d) HDMI cable


Question 78

What does WWW stand for in the context of web services?

  • a) World Web Window

  • b) World Wide Web

  • c) Wide World Web

  • d) Web Wide World


Question 79

Which protocol governs the exchange of documents over the web?

  • a) FTP

  • b) SMTP

  • c) HTTP/HTTPS

  • d) IMAP


Question 80

Which of the following is an example of a web browser?

  • a) Apache

  • b) Google Chrome

  • c) FTP Server

  • d) VPN


Question 81

What does an IP address represent in networking?

  • a) The unique address of a document on the web

  • b) The location of a computer or device on the internet

  • c) The physical address of a server

  • d) A protocol for sending emails


Question 82

Which of the following is an example of a URL (Uniform Resource Locator)?

  • a) 192.168.1.1

  • b) www.example.com

  • c) MAC address

  • d) HTML tag


Question 83

What is the difference between an IP address and a URL?

  • a) IP addresses identify servers, URLs identify documents

  • b) IP addresses identify documents, URLs identify servers

  • c) URLs are numerical, IP addresses are text-based

  • d) Both are the same


Question 84

What is the first page of a website typically called?

  • a) Homepage

  • b) Index page

  • c) Web server page

  • d) FTP page


Question 85

Which protocol is used to transfer files from one server to another on the web?

  • a) HTTP

  • b) FTP

  • c) TCP

  • d) SMTP


Question 86

What does the term "web hosting" refer to?

  • a) Designing web pages

  • b) Storing web pages on a server

  • c) Browsing the internet

  • d) Accessing email services


Question 87

Which of the following is a client-side scripting language used to make web pages interactive?

  • a) PHP

  • b) JavaScript

  • c) SQL

  • d) Python


Question 88

Which of the following is NOT an example of a server-side scripting language?

  • a) PHP

  • b) JSP

  • c) JavaScript

  • d) ASP


Question 89

What is the main feature of Web 2.0 technologies?

  • a) Static websites

  • b) User interaction and content sharing

  • c) High-speed file transfers

  • d) Cloud computing


Question 90

What does HTML stand for?

  • a) Hyperlink Text Markup Language

  • b) Hyper Text Markup Language

  • c) Hyper Transfer Markup Language

  • d) Hybrid Text Markup Language


Question 91

Which markup language is primarily used to carry and exchange data rather than display it?

  • a) HTML

  • b) XML

  • c) SQL

  • d) CSS


Question 92

Which of the following best describes a "domain name"?

  • a) A unique identifier for each website

  • b) A program used to browse the web

  • c) A collection of interlinked web pages

  • d) The physical address of a server


Question 93

Which protocol is used by a web browser to communicate with a web server?

  • a) HTTP

  • b) DNS

  • c) FTP

  • d) SMTP


Question 94

What is the role of a web server in web services?

  • a) Host multimedia content

  • b) Process client-side scripts

  • c) Respond to web browser requests

  • d) Manage emails


Question 95

What does the term "URL" stand for?

  • a) Uniform Resource Locator

  • b) Uniform Resource Link

  • c) Unique Resource Locator

  • d) Unified Resource Location


Question 96

What is an example of a web 2.0 application?

  • a) Google Docs

  • b) Microsoft Word

  • c) HTML editor

  • d) Linux terminal


Question 97

Which of the following is a key difference between HTML and XML?

  • a) HTML is used to display data, XML is used to carry data

  • b) HTML is case-sensitive, XML is not

  • c) XML is only used for websites, while HTML is used for apps

  • d) HTML is a programming language, XML is a markup language


Question 98

Which language is used to define the structure of web documents in Web 2.0?

  • a) HTML

  • b) CSS

  • c) XML

  • d) SQL


Question 99

Which of the following statements is true for client-side scripts?

  • a) They are executed on the server

  • b) They are executed by the browser on the client’s computer

  • c) They are browser-independent

  • d) They are faster than server-side scripts


Question 100

What is the main advantage of server-side scripting over client-side scripting?

  • a) It reduces server load

  • b) It is more secure

  • c) It provides better UI

  • d) It is faster


MS

Networking

Networking MCQs Flashcards

Question 1

Which of the following topologies is most suited for fault-tolerant networks but may require the most cabling?

  • a) Bus topology

  • b) Ring topology

  • c) Star topology

  • d) Mesh topology


Question 2

In which type of network topology does each node connect to a central hub?

  • a) Ring topology

  • b) Star topology

  • c) Bus topology

  • d) Mesh topology


Question 3

Which transmission medium is least affected by electromagnetic interference?

  • a) Twisted-pair cable

  • b) Coaxial cable

  • c) Optical fiber

  • d) Satellite signals


Question 4

Which device operates at the network layer of the OSI model and helps to determine the best path for data to travel?

  • a) Switch

  • b) Hub

  • c) Router

  • d) Repeater


Question 5

What is the primary difference between a hub and a switch in networking?

  • a) A hub uses MAC addresses, while a switch uses IP addresses.

  • b) A switch transmits data in broadcast mode, while a hub transmits in unicast mode.

  • c) A hub forwards data to all connected devices, while a switch forwards data to specific devices.

  • d) A hub operates at Layer 3 of the OSI model, while a switch operates at Layer 2.


Question 6

Which of the following is not a characteristic of TCP (Transmission Control Protocol)?

  • a) Reliable data transmission

  • b) Flow control

  • c) Connection-oriented

  • d) Unreliable delivery


Question 7

Which protocol is primarily responsible for assigning IP addresses in a network?

  • a) DNS

  • b) DHCP

  • c) HTTP

  • d) FTP


Question 8

Which of the following is a type of malware that locks your files and demands a ransom to restore access?

  • a) Virus

  • b) Worm

  • c) Trojan horse

  • d) Ransomware


Question 9

What does a firewall primarily do in the context of network security?

  • a) Encrypt data for secure transmission

  • b) Detect and remove malware

  • c) Control incoming and outgoing network traffic based on predetermined rules

  • d) Monitor real-time data traffic to identify potential threats


Question 10

Which type of cyberattack involves overwhelming a network with a flood of traffic, making services unavailable?

  • a) Phishing

  • b) Man-in-the-middle attack

  • c) Distributed Denial of Service (DDoS)

  • d) SQL Injection


Question 11

Which of the following is true for a bus topology?

  • a) It provides the most fault tolerance.

  • b) It has a single point of failure at the central hub.

  • c) It uses a single backbone cable to connect all devices.

  • d) It is the most secure topology.


Question 12

Which transmission medium provides the highest bandwidth for long-distance communication?

  • a) Twisted-pair cable

  • b) Coaxial cable

  • c) Optical fiber

  • d) Wireless radio waves


Question 13

What layer of the OSI model is responsible for encryption and decryption of data?

  • a) Data Link Layer

  • b) Transport Layer

  • c) Session Layer

  • d) Presentation Layer


Question 14

Which of the following is NOT a type of network topology?

  • a) Mesh

  • b) Hybrid

  • c) Bus

  • d) Repeater


Question 15

What is the primary purpose of a DNS (Domain Name System)?

  • a) To translate domain names to IP addresses

  • b) To assign MAC addresses to devices

  • c) To encrypt internet traffic

  • d) To provide fault tolerance in a network


Question 16

Which device is used to connect different networks together?

  • a) Hub

  • b) Repeater

  • c) Switch

  • d) Router


Question 17

Which of the following uses time division multiplexing (TDM) for transmission?

  • a) Fiber-optic cables

  • b) Ethernet cables

  • c) Satellite communication

  • d) Token Ring network


Question 18

Which OSI layer ensures error-free data transmission between adjacent nodes?

  • a) Physical Layer

  • b) Network Layer

  • c) Data Link Layer

  • d) Transport Layer


Question 19

Which device breaks up collision domains but not broadcast domains?

  • a) Hub

  • b) Switch

  • c) Router

  • d) Repeater


Question 20

Which type of IP address is non-routable and used within private networks?

  • a) Public IP address

  • b) Private IP address

  • c) Dynamic IP address

  • d) Static IP address


Question 21

Which of the following is NOT a secure wireless protocol?

  • a) WPA2

  • b) WEP

  • c) WPA

  • d) WPA3


Question 22

What is the primary advantage of using fiber-optic cables over copper cables?

  • a) Higher flexibility

  • b) Resistance to electromagnetic interference

  • c) Easier to install

  • d) Lower cost


Question 23

Which of the following protocols is used for secure file transfer over the internet?

  • a) HTTP

  • b) FTP

  • c) SFTP

  • d) DHCP


Question 24

What is the function of ARP (Address Resolution Protocol)?

  • a) To assign IP addresses to devices

  • b) To resolve MAC addresses from IP addresses

  • c) To route data between different networks

  • d) To encrypt network traffic


Question 25

Which network device operates at both Layer 2 and Layer 3 of the OSI model?

  • a) Hub

  • b) Switch

  • c) Repeater

  • d) Router


Question 26

In which type of cyberattack does an attacker intercept communications between two parties?

  • a) Phishing

  • b) Man-in-the-middle attack

  • c) Denial of Service

  • d) Ransomware


Question 27

Which of the following is a technique to break down a large network into smaller, more manageable subnetworks?

  • a) Fragmentation

  • b) Subnetting

  • c) Virtualization

  • d) Encryption


Question 28

Which port number is used by HTTPS?

  • a) 21

  • b) 22

  • c) 443

  • d) 80


Question 29

Which of the following protocols allows remote access to a computer using a secure connection?

  • a) Telnet

  • b) SSH

  • c) HTTP

  • d) POP3


Question 30

Which of the following is a key feature of a VPN (Virtual Private Network)?

  • a) It improves internet speed.

  • b) It provides encryption and anonymity for users.

  • c) It blocks all types of malware.

  • d) It acts as a firewall.


Question 31

Which of the following is NOT a function of a router?

  • a) Traffic forwarding

  • b) Packet switching

  • c) Network segmentation

  • d) Data encryption


Question 32

What does IPsec (Internet Protocol Security) provide in a network?

  • a) Data integrity and confidentiality

  • b) Faster data transmission

  • c) Dynamic IP addressing

  • d) Network address translation


Question 33

Which of the following protocols is responsible for ensuring data is delivered without errors and in the correct sequence?

  • a) UDP

  • b) FTP

  • c) TCP

  • d) IP


Question 34

Which cybersecurity attack involves a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity?

  • a) Phishing

  • b) DDoS

  • c) Brute force attack

  • d) Keylogging


Question 35

Which device amplifies and regenerates signals to extend the distance of a network?

  • a) Switch

  • b) Hub

  • c) Repeater

  • d) Router


Question 36

Which of the following is true about a peer-to-peer network?

  • a) It requires a central server for communication.

  • b) It is highly scalable for large networks.

  • c) All devices have equal privileges.

  • d) It provides better security than a client-server network.


Question 37

Which malware type disguises itself as legitimate software but performs harmful actions in the background?

  • a) Virus

  • b) Worm

  • c) Trojan horse

  • d) Ransomware


Question 38

Which of the following can provide an added layer of security by allowing or denying traffic based on policies?

  • a) Router

  • b) Firewall

  • c) Hub

  • d) Switch


Question 39

What is the purpose of NAT (Network Address Translation)?

  • a) To assign private IP addresses to devices

  • b) To allow multiple devices to share a single public IP address

  • c) To encrypt traffic on public networks

  • d) To establish VPN connections


Question 40

Which of the following attacks exploits a vulnerability in databases by inserting malicious code?

  • a) SQL injection

  • b) Phishing

  • c) DDoS attack

  • d) Keylogging


Question 41

What role does the Transport Layer of the OSI model play in networking?

  • a) Provides error checking and flow control

  • b) Defines hardware specifications for network communication

  • c) Routes packets across different networks

  • d) Encrypts data during transmission


Question 42

Which of the following protocols is commonly used for sending email?

  • a) FTP

  • b) SMTP

  • c) IMAP

  • d) HTTP


Question 43

What does a honeypot in cybersecurity refer to?

  • a) A malicious server used to attack hackers

  • b) A system set up to attract attackers and study their methods

  • c) A secure network node to redirect traffic

  • d) An encrypted database storing sensitive data


Question 44

Which term refers to the unauthorized access of network resources?

  • a) Hacking

  • b) Phishing

  • c) Encryption

  • d) VPN


Question 45

What is the primary function of a VLAN (Virtual Local Area Network)?

  • a) Provides secure remote access

  • b) Segments a network into smaller, isolated sections

  • c) Encrypts all network traffic

  • d) Reduces bandwidth usage


Question 46

Which of the following is a principle of the CIA triad in cybersecurity?

  • a) Access control

  • b) Integrity

  • c) Non-repudiation

  • d) Redundancy


Question 47

Which of the following is a distributed computing framework for processing large datasets?

  • a) OSI model

  • b) Hadoop

  • c) SMTP

  • d) DHCP


Question 48

What is the main purpose of a proxy server?

  • a) To encrypt communications

  • b) To forward requests and responses between clients and servers

  • c) To act as a firewall

  • d) To directly transfer files between computers


Question 49

Which cybersecurity practice involves identifying weaknesses in a network before attackers can exploit them?

  • a) Phishing

  • b) Penetration testing

  • c) Ransomware

  • d) Social engineering


Question 50

Which of the following protocols is used for securing communication over a computer network?

  • a) HTTP

  • b) FTP

  • c) IPsec

  • d) DHCP


Question 51

Which network security tool monitors traffic in real time to detect suspicious activity?

  • a) Firewall

  • b) IDS (Intrusion Detection System)

  • c) Router

  • d) NAT


Question 52

Which of the following is an attack that attempts to crack encrypted data by trying every possible combination?

  • a) Brute force attack

  • b) Phishing

  • c) DDoS attack

  • d) Malware injection


Question 53

Which of the following cybersecurity principles ensures that data has not been altered or tampered with?

  • a) Confidentiality

  • b) Integrity

  • c) Availability

  • d) Redundancy


Question 54

Which of the following protocols is used for downloading emails from a server to a local client?

  • a) SMTP

  • b) IMAP

  • c) FTP

  • d) DNS


Question 55

Which type of malware replicates itself without any human intervention?

  • a) Virus

  • b) Worm

  • c) Trojan horse

  • d) Spyware


Question 56

What is the primary difference between UDP and TCP?

  • a) TCP is connection-oriented, while UDP is connectionless.

  • b) UDP ensures reliable data transfer, while TCP does not.

  • c) UDP operates at the Data Link Layer, while TCP operates at the Network Layer.

  • d) TCP is faster than UDP.


Question 57

Which of the following is an advantage of IPv6 over IPv4?

  • a) Shorter addresses

  • b) Larger address space

  • c) Less secure protocol

  • d) Faster data transmission


Question 58

Which of the following security measures prevents unauthorized access to a network?

  • a) MAC filtering

  • b) ARP spoofing

  • c) DHCP snooping

  • d) Subnetting


Question 59

What is a key characteristic of a cloud-based network?

  • a) All data is stored locally.

  • b) Services are available over the internet.

  • c) It requires specialized hardware.

  • d) It is slower than traditional networks.


Question 60

Which of the following refers to a system that automatically detects and responds to security incidents in real-time?

  • a) IDS

  • b) IPS (Intrusion Prevention System)

  • c) Proxy server

  • d) NAT


Question 61

What is the primary function of a Network Interface Card (NIC)?

  • a) Connect multiple computers in a LAN

  • b) Convert analog signals to digital

  • c) Connect a computer to a network

  • d) Amplify weak signals in a network


Question 62

Which device converts digital data to analog signals for transmission over telephone lines?

  • a) Hub

  • b) Repeater

  • c) Modem

  • d) Router


Question 63

What type of connector is typically used for connecting computers in a LAN using twisted-pair cables?

  • a) RJ-11

  • b) RJ-45

  • c) HDMI

  • d) USB


Question 64

Which device is commonly used to regenerate weak signals in a network?

  • a) Switch

  • b) Hub

  • c) Repeater

  • d) Gateway


Question 65

What is a significant disadvantage of using a hub in a network?

  • a) It broadcasts data to all connected devices.

  • b) It only supports wireless networks.

  • c) It only connects two devices.

  • d) It is too expensive to deploy.


Question 66

Which device intelligently forwards data only to the intended recipient in a network?

  • a) Hub

  • b) Switch

  • c) Repeater

  • d) Router


Question 67

A wireless access point (WAP) allows devices to connect to a network using which technology?

  • a) Bluetooth

  • b) Wi-Fi

  • c) Ethernet

  • d) Coaxial cables


Question 68

Which device is used to connect two different types of networks?

  • a) Hub

  • b) Switch

  • c) Router

  • d) Gateway


Question 69

Which of the following is an example of wired transmission media?

  • a) Radio waves

  • b) Optical fiber

  • c) Infrared waves

  • d) Microwaves


Question 70

What type of transmission media is best suited for long-distance, high-bandwidth communication?

  • a) Coaxial cable

  • b) Twisted-pair cable

  • c) Optical fiber

  • d) Radio waves


Question 71

Which cable is made of copper and is twisted to reduce interference?

  • a) Coaxial cable

  • b) Optical fiber cable

  • c) Twisted-pair cable

  • d) Ethernet cable


Question 72

Which of the following is NOT an example of wireless transmission media?

  • a) Microwave

  • b) Optical fiber

  • c) Infrared waves

  • d) Satellite link


Question 73

Which transmission media has the highest resistance to electromagnetic interference (EMI)?

  • a) Twisted-pair cable

  • b) Coaxial cable

  • c) Optical fiber cable

  • d) Microwave signals


Question 74

What is the main disadvantage of using optical fiber cables?

  • a) Low bandwidth

  • b) High cost and complexity

  • c) Susceptibility to electromagnetic interference

  • d) Limited range


Question 75

Which wireless technology is used in short-range communication, like remote controls and wireless mice?

  • a) Microwave

  • b) Infrared

  • c) Radio waves

  • d) Satellite


Question 76

What is the main function of a repeater in a network?

  • a) Convert digital data to analog

  • b) Amplify and regenerate weak signals

  • c) Distribute IP addresses

  • d) Route data between different networks


Question 77

Which type of cable is commonly used in television signal transmission?

  • a) Coaxial cable

  • b) Twisted-pair cable

  • c) Optical fiber cable

  • d) HDMI cable


Question 78

What does WWW stand for in the context of web services?

  • a) World Web Window

  • b) World Wide Web

  • c) Wide World Web

  • d) Web Wide World


Question 79

Which protocol governs the exchange of documents over the web?

  • a) FTP

  • b) SMTP

  • c) HTTP/HTTPS

  • d) IMAP


Question 80

Which of the following is an example of a web browser?

  • a) Apache

  • b) Google Chrome

  • c) FTP Server

  • d) VPN


Question 81

What does an IP address represent in networking?

  • a) The unique address of a document on the web

  • b) The location of a computer or device on the internet

  • c) The physical address of a server

  • d) A protocol for sending emails


Question 82

Which of the following is an example of a URL (Uniform Resource Locator)?

  • a) 192.168.1.1

  • b) www.example.com

  • c) MAC address

  • d) HTML tag


Question 83

What is the difference between an IP address and a URL?

  • a) IP addresses identify servers, URLs identify documents

  • b) IP addresses identify documents, URLs identify servers

  • c) URLs are numerical, IP addresses are text-based

  • d) Both are the same


Question 84

What is the first page of a website typically called?

  • a) Homepage

  • b) Index page

  • c) Web server page

  • d) FTP page


Question 85

Which protocol is used to transfer files from one server to another on the web?

  • a) HTTP

  • b) FTP

  • c) TCP

  • d) SMTP


Question 86

What does the term "web hosting" refer to?

  • a) Designing web pages

  • b) Storing web pages on a server

  • c) Browsing the internet

  • d) Accessing email services


Question 87

Which of the following is a client-side scripting language used to make web pages interactive?

  • a) PHP

  • b) JavaScript

  • c) SQL

  • d) Python


Question 88

Which of the following is NOT an example of a server-side scripting language?

  • a) PHP

  • b) JSP

  • c) JavaScript

  • d) ASP


Question 89

What is the main feature of Web 2.0 technologies?

  • a) Static websites

  • b) User interaction and content sharing

  • c) High-speed file transfers

  • d) Cloud computing


Question 90

What does HTML stand for?

  • a) Hyperlink Text Markup Language

  • b) Hyper Text Markup Language

  • c) Hyper Transfer Markup Language

  • d) Hybrid Text Markup Language


Question 91

Which markup language is primarily used to carry and exchange data rather than display it?

  • a) HTML

  • b) XML

  • c) SQL

  • d) CSS


Question 92

Which of the following best describes a "domain name"?

  • a) A unique identifier for each website

  • b) A program used to browse the web

  • c) A collection of interlinked web pages

  • d) The physical address of a server


Question 93

Which protocol is used by a web browser to communicate with a web server?

  • a) HTTP

  • b) DNS

  • c) FTP

  • d) SMTP


Question 94

What is the role of a web server in web services?

  • a) Host multimedia content

  • b) Process client-side scripts

  • c) Respond to web browser requests

  • d) Manage emails


Question 95

What does the term "URL" stand for?

  • a) Uniform Resource Locator

  • b) Uniform Resource Link

  • c) Unique Resource Locator

  • d) Unified Resource Location


Question 96

What is an example of a web 2.0 application?

  • a) Google Docs

  • b) Microsoft Word

  • c) HTML editor

  • d) Linux terminal


Question 97

Which of the following is a key difference between HTML and XML?

  • a) HTML is used to display data, XML is used to carry data

  • b) HTML is case-sensitive, XML is not

  • c) XML is only used for websites, while HTML is used for apps

  • d) HTML is a programming language, XML is a markup language


Question 98

Which language is used to define the structure of web documents in Web 2.0?

  • a) HTML

  • b) CSS

  • c) XML

  • d) SQL


Question 99

Which of the following statements is true for client-side scripts?

  • a) They are executed on the server

  • b) They are executed by the browser on the client’s computer

  • c) They are browser-independent

  • d) They are faster than server-side scripts


Question 100

What is the main advantage of server-side scripting over client-side scripting?

  • a) It reduces server load

  • b) It is more secure

  • c) It provides better UI

  • d) It is faster


robot