Networking
Networking MCQs Flashcards
Question 1
Which of the following topologies is most suited for fault-tolerant networks but may require the most cabling?
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology
Question 2
In which type of network topology does each node connect to a central hub?
a) Ring topology
b) Star topology
c) Bus topology
d) Mesh topology
Question 3
Which transmission medium is least affected by electromagnetic interference?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber
d) Satellite signals
Question 4
Which device operates at the network layer of the OSI model and helps to determine the best path for data to travel?
a) Switch
b) Hub
c) Router
d) Repeater
Question 5
What is the primary difference between a hub and a switch in networking?
a) A hub uses MAC addresses, while a switch uses IP addresses.
b) A switch transmits data in broadcast mode, while a hub transmits in unicast mode.
c) A hub forwards data to all connected devices, while a switch forwards data to specific devices.
d) A hub operates at Layer 3 of the OSI model, while a switch operates at Layer 2.
Question 6
Which of the following is not a characteristic of TCP (Transmission Control Protocol)?
a) Reliable data transmission
b) Flow control
c) Connection-oriented
d) Unreliable delivery
Question 7
Which protocol is primarily responsible for assigning IP addresses in a network?
a) DNS
b) DHCP
c) HTTP
d) FTP
Question 8
Which of the following is a type of malware that locks your files and demands a ransom to restore access?
a) Virus
b) Worm
c) Trojan horse
d) Ransomware
Question 9
What does a firewall primarily do in the context of network security?
a) Encrypt data for secure transmission
b) Detect and remove malware
c) Control incoming and outgoing network traffic based on predetermined rules
d) Monitor real-time data traffic to identify potential threats
Question 10
Which type of cyberattack involves overwhelming a network with a flood of traffic, making services unavailable?
a) Phishing
b) Man-in-the-middle attack
c) Distributed Denial of Service (DDoS)
d) SQL Injection
Question 11
Which of the following is true for a bus topology?
a) It provides the most fault tolerance.
b) It has a single point of failure at the central hub.
c) It uses a single backbone cable to connect all devices.
d) It is the most secure topology.
Question 12
Which transmission medium provides the highest bandwidth for long-distance communication?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber
d) Wireless radio waves
Question 13
What layer of the OSI model is responsible for encryption and decryption of data?
a) Data Link Layer
b) Transport Layer
c) Session Layer
d) Presentation Layer
Question 14
Which of the following is NOT a type of network topology?
a) Mesh
b) Hybrid
c) Bus
d) Repeater
Question 15
What is the primary purpose of a DNS (Domain Name System)?
a) To translate domain names to IP addresses
b) To assign MAC addresses to devices
c) To encrypt internet traffic
d) To provide fault tolerance in a network
Question 16
Which device is used to connect different networks together?
a) Hub
b) Repeater
c) Switch
d) Router
Question 17
Which of the following uses time division multiplexing (TDM) for transmission?
a) Fiber-optic cables
b) Ethernet cables
c) Satellite communication
d) Token Ring network
Question 18
Which OSI layer ensures error-free data transmission between adjacent nodes?
a) Physical Layer
b) Network Layer
c) Data Link Layer
d) Transport Layer
Question 19
Which device breaks up collision domains but not broadcast domains?
a) Hub
b) Switch
c) Router
d) Repeater
Question 20
Which type of IP address is non-routable and used within private networks?
a) Public IP address
b) Private IP address
c) Dynamic IP address
d) Static IP address
Question 21
Which of the following is NOT a secure wireless protocol?
a) WPA2
b) WEP
c) WPA
d) WPA3
Question 22
What is the primary advantage of using fiber-optic cables over copper cables?
a) Higher flexibility
b) Resistance to electromagnetic interference
c) Easier to install
d) Lower cost
Question 23
Which of the following protocols is used for secure file transfer over the internet?
a) HTTP
b) FTP
c) SFTP
d) DHCP
Question 24
What is the function of ARP (Address Resolution Protocol)?
a) To assign IP addresses to devices
b) To resolve MAC addresses from IP addresses
c) To route data between different networks
d) To encrypt network traffic
Question 25
Which network device operates at both Layer 2 and Layer 3 of the OSI model?
a) Hub
b) Switch
c) Repeater
d) Router
Question 26
In which type of cyberattack does an attacker intercept communications between two parties?
a) Phishing
b) Man-in-the-middle attack
c) Denial of Service
d) Ransomware
Question 27
Which of the following is a technique to break down a large network into smaller, more manageable subnetworks?
a) Fragmentation
b) Subnetting
c) Virtualization
d) Encryption
Question 28
Which port number is used by HTTPS?
a) 21
b) 22
c) 443
d) 80
Question 29
Which of the following protocols allows remote access to a computer using a secure connection?
a) Telnet
b) SSH
c) HTTP
d) POP3
Question 30
Which of the following is a key feature of a VPN (Virtual Private Network)?
a) It improves internet speed.
b) It provides encryption and anonymity for users.
c) It blocks all types of malware.
d) It acts as a firewall.
Question 31
Which of the following is NOT a function of a router?
a) Traffic forwarding
b) Packet switching
c) Network segmentation
d) Data encryption
Question 32
What does IPsec (Internet Protocol Security) provide in a network?
a) Data integrity and confidentiality
b) Faster data transmission
c) Dynamic IP addressing
d) Network address translation
Question 33
Which of the following protocols is responsible for ensuring data is delivered without errors and in the correct sequence?
a) UDP
b) FTP
c) TCP
d) IP
Question 34
Which cybersecurity attack involves a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity?
a) Phishing
b) DDoS
c) Brute force attack
d) Keylogging
Question 35
Which device amplifies and regenerates signals to extend the distance of a network?
a) Switch
b) Hub
c) Repeater
d) Router
Question 36
Which of the following is true about a peer-to-peer network?
a) It requires a central server for communication.
b) It is highly scalable for large networks.
c) All devices have equal privileges.
d) It provides better security than a client-server network.
Question 37
Which malware type disguises itself as legitimate software but performs harmful actions in the background?
a) Virus
b) Worm
c) Trojan horse
d) Ransomware
Question 38
Which of the following can provide an added layer of security by allowing or denying traffic based on policies?
a) Router
b) Firewall
c) Hub
d) Switch
Question 39
What is the purpose of NAT (Network Address Translation)?
a) To assign private IP addresses to devices
b) To allow multiple devices to share a single public IP address
c) To encrypt traffic on public networks
d) To establish VPN connections
Question 40
Which of the following attacks exploits a vulnerability in databases by inserting malicious code?
a) SQL injection
b) Phishing
c) DDoS attack
d) Keylogging
Question 41
What role does the Transport Layer of the OSI model play in networking?
a) Provides error checking and flow control
b) Defines hardware specifications for network communication
c) Routes packets across different networks
d) Encrypts data during transmission
Question 42
Which of the following protocols is commonly used for sending email?
a) FTP
b) SMTP
c) IMAP
d) HTTP
Question 43
What does a honeypot in cybersecurity refer to?
a) A malicious server used to attack hackers
b) A system set up to attract attackers and study their methods
c) A secure network node to redirect traffic
d) An encrypted database storing sensitive data
Question 44
Which term refers to the unauthorized access of network resources?
a) Hacking
b) Phishing
c) Encryption
d) VPN
Question 45
What is the primary function of a VLAN (Virtual Local Area Network)?
a) Provides secure remote access
b) Segments a network into smaller, isolated sections
c) Encrypts all network traffic
d) Reduces bandwidth usage
Question 46
Which of the following is a principle of the CIA triad in cybersecurity?
a) Access control
b) Integrity
c) Non-repudiation
d) Redundancy
Question 47
Which of the following is a distributed computing framework for processing large datasets?
a) OSI model
b) Hadoop
c) SMTP
d) DHCP
Question 48
What is the main purpose of a proxy server?
a) To encrypt communications
b) To forward requests and responses between clients and servers
c) To act as a firewall
d) To directly transfer files between computers
Question 49
Which cybersecurity practice involves identifying weaknesses in a network before attackers can exploit them?
a) Phishing
b) Penetration testing
c) Ransomware
d) Social engineering
Question 50
Which of the following protocols is used for securing communication over a computer network?
a) HTTP
b) FTP
c) IPsec
d) DHCP
Question 51
Which network security tool monitors traffic in real time to detect suspicious activity?
a) Firewall
b) IDS (Intrusion Detection System)
c) Router
d) NAT
Question 52
Which of the following is an attack that attempts to crack encrypted data by trying every possible combination?
a) Brute force attack
b) Phishing
c) DDoS attack
d) Malware injection
Question 53
Which of the following cybersecurity principles ensures that data has not been altered or tampered with?
a) Confidentiality
b) Integrity
c) Availability
d) Redundancy
Question 54
Which of the following protocols is used for downloading emails from a server to a local client?
a) SMTP
b) IMAP
c) FTP
d) DNS
Question 55
Which type of malware replicates itself without any human intervention?
a) Virus
b) Worm
c) Trojan horse
d) Spyware
Question 56
What is the primary difference between UDP and TCP?
a) TCP is connection-oriented, while UDP is connectionless.
b) UDP ensures reliable data transfer, while TCP does not.
c) UDP operates at the Data Link Layer, while TCP operates at the Network Layer.
d) TCP is faster than UDP.
Question 57
Which of the following is an advantage of IPv6 over IPv4?
a) Shorter addresses
b) Larger address space
c) Less secure protocol
d) Faster data transmission
Question 58
Which of the following security measures prevents unauthorized access to a network?
a) MAC filtering
b) ARP spoofing
c) DHCP snooping
d) Subnetting
Question 59
What is a key characteristic of a cloud-based network?
a) All data is stored locally.
b) Services are available over the internet.
c) It requires specialized hardware.
d) It is slower than traditional networks.
Question 60
Which of the following refers to a system that automatically detects and responds to security incidents in real-time?
a) IDS
b) IPS (Intrusion Prevention System)
c) Proxy server
d) NAT
Question 61
What is the primary function of a Network Interface Card (NIC)?
a) Connect multiple computers in a LAN
b) Convert analog signals to digital
c) Connect a computer to a network
d) Amplify weak signals in a network
Question 62
Which device converts digital data to analog signals for transmission over telephone lines?
a) Hub
b) Repeater
c) Modem
d) Router
Question 63
What type of connector is typically used for connecting computers in a LAN using twisted-pair cables?
a) RJ-11
b) RJ-45
c) HDMI
d) USB
Question 64
Which device is commonly used to regenerate weak signals in a network?
a) Switch
b) Hub
c) Repeater
d) Gateway
Question 65
What is a significant disadvantage of using a hub in a network?
a) It broadcasts data to all connected devices.
b) It only supports wireless networks.
c) It only connects two devices.
d) It is too expensive to deploy.
Question 66
Which device intelligently forwards data only to the intended recipient in a network?
a) Hub
b) Switch
c) Repeater
d) Router
Question 67
A wireless access point (WAP) allows devices to connect to a network using which technology?
a) Bluetooth
b) Wi-Fi
c) Ethernet
d) Coaxial cables
Question 68
Which device is used to connect two different types of networks?
a) Hub
b) Switch
c) Router
d) Gateway
Question 69
Which of the following is an example of wired transmission media?
a) Radio waves
b) Optical fiber
c) Infrared waves
d) Microwaves
Question 70
What type of transmission media is best suited for long-distance, high-bandwidth communication?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber
d) Radio waves
Question 71
Which cable is made of copper and is twisted to reduce interference?
a) Coaxial cable
b) Optical fiber cable
c) Twisted-pair cable
d) Ethernet cable
Question 72
Which of the following is NOT an example of wireless transmission media?
a) Microwave
b) Optical fiber
c) Infrared waves
d) Satellite link
Question 73
Which transmission media has the highest resistance to electromagnetic interference (EMI)?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber cable
d) Microwave signals
Question 74
What is the main disadvantage of using optical fiber cables?
a) Low bandwidth
b) High cost and complexity
c) Susceptibility to electromagnetic interference
d) Limited range
Question 75
Which wireless technology is used in short-range communication, like remote controls and wireless mice?
a) Microwave
b) Infrared
c) Radio waves
d) Satellite
Question 76
What is the main function of a repeater in a network?
a) Convert digital data to analog
b) Amplify and regenerate weak signals
c) Distribute IP addresses
d) Route data between different networks
Question 77
Which type of cable is commonly used in television signal transmission?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber cable
d) HDMI cable
Question 78
What does WWW stand for in the context of web services?
a) World Web Window
b) World Wide Web
c) Wide World Web
d) Web Wide World
Question 79
Which protocol governs the exchange of documents over the web?
a) FTP
b) SMTP
c) HTTP/HTTPS
d) IMAP
Question 80
Which of the following is an example of a web browser?
a) Apache
b) Google Chrome
c) FTP Server
d) VPN
Question 81
What does an IP address represent in networking?
a) The unique address of a document on the web
b) The location of a computer or device on the internet
c) The physical address of a server
d) A protocol for sending emails
Question 82
Which of the following is an example of a URL (Uniform Resource Locator)?
a) 192.168.1.1
b) www.example.com
c) MAC address
d) HTML tag
Question 83
What is the difference between an IP address and a URL?
a) IP addresses identify servers, URLs identify documents
b) IP addresses identify documents, URLs identify servers
c) URLs are numerical, IP addresses are text-based
d) Both are the same
Question 84
What is the first page of a website typically called?
a) Homepage
b) Index page
c) Web server page
d) FTP page
Question 85
Which protocol is used to transfer files from one server to another on the web?
a) HTTP
b) FTP
c) TCP
d) SMTP
Question 86
What does the term "web hosting" refer to?
a) Designing web pages
b) Storing web pages on a server
c) Browsing the internet
d) Accessing email services
Question 87
Which of the following is a client-side scripting language used to make web pages interactive?
a) PHP
b) JavaScript
c) SQL
d) Python
Question 88
Which of the following is NOT an example of a server-side scripting language?
a) PHP
b) JSP
c) JavaScript
d) ASP
Question 89
What is the main feature of Web 2.0 technologies?
a) Static websites
b) User interaction and content sharing
c) High-speed file transfers
d) Cloud computing
Question 90
What does HTML stand for?
a) Hyperlink Text Markup Language
b) Hyper Text Markup Language
c) Hyper Transfer Markup Language
d) Hybrid Text Markup Language
Question 91
Which markup language is primarily used to carry and exchange data rather than display it?
a) HTML
b) XML
c) SQL
d) CSS
Question 92
Which of the following best describes a "domain name"?
a) A unique identifier for each website
b) A program used to browse the web
c) A collection of interlinked web pages
d) The physical address of a server
Question 93
Which protocol is used by a web browser to communicate with a web server?
a) HTTP
b) DNS
c) FTP
d) SMTP
Question 94
What is the role of a web server in web services?
a) Host multimedia content
b) Process client-side scripts
c) Respond to web browser requests
d) Manage emails
Question 95
What does the term "URL" stand for?
a) Uniform Resource Locator
b) Uniform Resource Link
c) Unique Resource Locator
d) Unified Resource Location
Question 96
What is an example of a web 2.0 application?
a) Google Docs
b) Microsoft Word
c) HTML editor
d) Linux terminal
Question 97
Which of the following is a key difference between HTML and XML?
a) HTML is used to display data, XML is used to carry data
b) HTML is case-sensitive, XML is not
c) XML is only used for websites, while HTML is used for apps
d) HTML is a programming language, XML is a markup language
Question 98
Which language is used to define the structure of web documents in Web 2.0?
a) HTML
b) CSS
c) XML
d) SQL
Question 99
Which of the following statements is true for client-side scripts?
a) They are executed on the server
b) They are executed by the browser on the client’s computer
c) They are browser-independent
d) They are faster than server-side scripts
Question 100
What is the main advantage of server-side scripting over client-side scripting?
a) It reduces server load
b) It is more secure
c) It provides better UI
d) It is faster