Networking
Which of the following topologies is most suited for fault-tolerant networks but may require the most cabling?
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology
In which type of network topology does each node connect to a central hub?
a) Ring topology
b) Star topology
c) Bus topology
d) Mesh topology
Which transmission medium is least affected by electromagnetic interference?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber
d) Satellite signals
Which device operates at the network layer of the OSI model and helps to determine the best path for data to travel?
a) Switch
b) Hub
c) Router
d) Repeater
What is the primary difference between a hub and a switch in networking?
a) A hub uses MAC addresses, while a switch uses IP addresses.
b) A switch transmits data in broadcast mode, while a hub transmits in unicast mode.
c) A hub forwards data to all connected devices, while a switch forwards data to specific devices.
d) A hub operates at Layer 3 of the OSI model, while a switch operates at Layer 2.
Which of the following is not a characteristic of TCP (Transmission Control Protocol)?
a) Reliable data transmission
b) Flow control
c) Connection-oriented
d) Unreliable delivery
Which protocol is primarily responsible for assigning IP addresses in a network?
a) DNS
b) DHCP
c) HTTP
d) FTP
Which of the following is a type of malware that locks your files and demands a ransom to restore access?
a) Virus
b) Worm
c) Trojan horse
d) Ransomware
What does a firewall primarily do in the context of network security?
a) Encrypt data for secure transmission
b) Detect and remove malware
c) Control incoming and outgoing network traffic based on predetermined rules
d) Monitor real-time data traffic to identify potential threats
Which type of cyberattack involves overwhelming a network with a flood of traffic, making services unavailable?
a) Phishing
b) Man-in-the-middle attack
c) Distributed Denial of Service (DDoS)
d) SQL Injection
Which of the following is true for a bus topology?
a) It provides the most fault tolerance.
b) It has a single point of failure at the central hub.
c) It uses a single backbone cable to connect all devices.
d) It is the most secure topology.
Which transmission medium provides the highest bandwidth for long-distance communication?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber
d) Wireless radio waves
What layer of the OSI model is responsible for encryption and decryption of data?
a) Data Link Layer
b) Transport Layer
c) Session Layer
d) Presentation Layer
Which of the following is NOT a type of network topology?
a) Mesh
b) Hybrid
c) Bus
d) Repeater
What is the primary purpose of a DNS (Domain Name System)?
a) To translate domain names to IP addresses
b) To assign MAC addresses to devices
c) To encrypt internet traffic
d) To provide fault tolerance in a network
Which device is used to connect different networks together?
a) Hub
b) Repeater
c) Switch
d) Router
Which of the following uses time division multiplexing (TDM) for transmission?
a) Fiber-optic cables
b) Ethernet cables
c) Satellite communication
d) Token Ring network
Which OSI layer ensures error-free data transmission between adjacent nodes?
a) Physical Layer
b) Network Layer
c) Data Link Layer
d) Transport Layer
Which device breaks up collision domains but not broadcast domains?
a) Hub
b) Switch
c) Router
d) Repeater
Which type of IP address is non-routable and used within private networks?
a) Public IP address
b) Private IP address
c) Dynamic IP address
d) Static IP address
Which of the following is NOT a secure wireless protocol?
a) WPA2
b) WEP
c) WPA
d) WPA3
What is the primary advantage of using fiber-optic cables over copper cables?
a) Higher flexibility
b) Resistance to electromagnetic interference
c) Easier to install
d) Lower cost
Which of the following protocols is used for secure file transfer over the internet?
a) HTTP
b) FTP
c) SFTP
d) DHCP
What is the function of ARP (Address Resolution Protocol)?
a) To assign IP addresses to devices
b) To resolve MAC addresses from IP addresses
c) To route data between different networks
d) To encrypt network traffic
Which network device operates at both Layer 2 and Layer 3 of the OSI model?
a) Hub
b) Switch
c) Repeater
d) Router
In which type of cyberattack does an attacker intercept communications between two parties?
a) Phishing
b) Man-in-the-middle attack
c) Denial of Service
d) Ransomware
Which of the following is a technique to break down a large network into smaller, more manageable subnetworks?
a) Fragmentation
b) Subnetting
c) Virtualization
d) Encryption
Which port number is used by HTTPS?
a) 21
b) 22
c) 443
d) 80
Which of the following protocols allows remote access to a computer using a secure connection?
a) Telnet
b) SSH
c) HTTP
d) POP3
Which of the following is a key feature of a VPN (Virtual Private Network)?
a) It improves internet speed.
b) It provides encryption and anonymity for users.
c) It blocks all types of malware.
d) It acts as a firewall.
Which of the following is NOT a function of a router?
a) Traffic forwarding
b) Packet switching
c) Network segmentation
d) Data encryption
What does IPsec (Internet Protocol Security) provide in a network?
a) Data integrity and confidentiality
b) Faster data transmission
c) Dynamic IP addressing
d) Network address translation
Which of the following protocols is responsible for ensuring data is delivered without errors and in the correct sequence?
a) UDP
b) FTP
c) TCP
d) IP
Which cybersecurity attack involves a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity?
a) Phishing
b) DDoS
c) Brute force attack
d) Keylogging
Which device amplifies and regenerates signals to extend the distance of a network?
a) Switch
b) Hub
c) Repeater
d) Router
Which of the following is true about a peer-to-peer network?
a) It requires a central server for communication.
b) It is highly scalable for large networks.
c) All devices have equal privileges.
d) It provides better security than a client-server network.
Which malware type disguises itself as legitimate software but performs harmful actions in the background?
a) Virus
b) Worm
c) Trojan horse
d) Ransomware
Which of the following can provide an added layer of security by allowing or denying traffic based on policies?
a) Router
b) Firewall
c) Hub
d) Switch
What is the purpose of NAT (Network Address Translation)?
a) To assign private IP addresses to devices
b) To allow multiple devices to share a single public IP address
c) To encrypt traffic on public networks
d) To establish VPN connections
Which of the following attacks exploits a vulnerability in databases by inserting malicious code?
a) SQL injection
b) Phishing
c) DDoS attack
d) Keylogging
What role does the Transport Layer of the OSI model play in networking?
a) Provides error checking and flow control
b) Defines hardware specifications for network communication
c) Routes packets across different networks
d) Encrypts data during transmission
Which of the following protocols is commonly used for sending email?
a) FTP
b) SMTP
c) IMAP
d) HTTP
What does a honeypot in cybersecurity refer to?
a) A malicious server used to attack hackers
b) A system set up to attract attackers and study their methods
c) A secure network node to redirect traffic
d) An encrypted database storing sensitive data
Which term refers to the unauthorized access of network resources?
a) Hacking
b) Phishing
c) Encryption
d) VPN
What is the primary function of a VLAN (Virtual Local Area Network)?
a) Provides secure remote access
b) Segments a network into smaller, isolated sections
c) Encrypts all network traffic
d) Reduces bandwidth usage
Which of the following is a principle of the CIA triad in cybersecurity?
a) Access control
b) Integrity
c) Non-repudiation
d) Redundancy
Which of the following is a distributed computing framework for processing large datasets?
a) OSI model
b) Hadoop
c) SMTP
d) DHCP
What is the main purpose of a proxy server?
a) To encrypt communications
b) To forward requests and responses between clients and servers
c) To act as a firewall
d) To directly transfer files between computers
Which cybersecurity practice involves identifying weaknesses in a network before attackers can exploit them?
a) Phishing
b) Penetration testing
c) Ransomware
d) Social engineering
Which of the following protocols is used for securing communication over a computer network?
a) HTTP
b) FTP
c) IPsec
d) DHCP
Which network security tool monitors traffic in real time to detect suspicious activity?
a) Firewall
b) IDS (Intrusion Detection System)
c) Router
d) NAT
Which of the following is an attack that attempts to crack encrypted data by trying every possible combination?
a) Brute force attack
b) Phishing
c) DDoS attack
d) Malware injection
Which of the following cybersecurity principles ensures that data has not been altered or tampered with?
a) Confidentiality
b) Integrity
c) Availability
d) Redundancy
Which of the following protocols is used for downloading emails from a server to a local client?
a) SMTP
b) IMAP
c) FTP
d) DNS
Which type of malware replicates itself without any human intervention?
a) Virus
b) Worm
c) Trojan horse
d) Spyware
What is the primary difference between UDP and TCP?
a) TCP is connection-oriented, while UDP is connectionless.
b) UDP ensures reliable data transfer, while TCP does not.
c) UDP operates at the Data Link Layer, while TCP operates at the Network Layer.
d) TCP is faster than UDP.
Which of the following is an advantage of IPv6 over IPv4?
a) Shorter addresses
b) Larger address space
c) Less secure protocol
d) Faster data transmission
Which of the following security measures prevents unauthorized access to a network?
a) MAC filtering
b) ARP spoofing
c) DHCP snooping
d) Subnetting
What is a key characteristic of a cloud-based network?
a) All data is stored locally.
b) Services are available over the internet.
c) It requires specialized hardware.
d) It is slower than traditional networks.
Which of the following refers to a system that automatically detects and responds to security incidents in real-time?
a) IDS
b) IPS (Intrusion Prevention System)
c) Proxy server
d) NAT
What is the primary function of a Network Interface Card (NIC)?
a) Connect multiple computers in a LAN
b) Convert analog signals to digital
c) Connect a computer to a network
d) Amplify weak signals in a network
Which device converts digital data to analog signals for transmission over telephone lines?
a) Hub
b) Repeater
c) Modem
d) Router
What type of connector is typically used for connecting computers in a LAN using twisted-pair cables?
a) RJ-11
b) RJ-45
c) HDMI
d) USB
Which device is commonly used to regenerate weak signals in a network?
a) Switch
b) Hub
c) Repeater
d) Gateway
What is a significant disadvantage of using a hub in a network?
a) It broadcasts data to all connected devices.
b) It only supports wireless networks.
c) It only connects two devices.
d) It is too expensive to deploy.
Which device intelligently forwards data only to the intended recipient in a network?
a) Hub
b) Switch
c) Repeater
d) Router
A wireless access point (WAP) allows devices to connect to a network using which technology?
a) Bluetooth
b) Wi-Fi
c) Ethernet
d) Coaxial cables
Which device is used to connect two different types of networks?
a) Hub
b) Switch
c) Router
d) Gateway
Which of the following is an example of wired transmission media?
a) Radio waves
b) Optical fiber
c) Infrared waves
d) Microwaves
What type of transmission media is best suited for long-distance, high-bandwidth communication?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber
d) Radio waves
Which cable is made of copper and is twisted to reduce interference?
a) Coaxial cable
b) Optical fiber cable
c) Twisted-pair cable
d) Ethernet cable
Which of the following is NOT an example of wireless transmission media?
a) Microwave
b) Optical fiber
c) Infrared waves
d) Satellite link
Which transmission media has the highest resistance to electromagnetic interference (EMI)?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber cable
d) Microwave signals
What is the main disadvantage of using optical fiber cables?
a) Low bandwidth
b) High cost and complexity
c) Susceptibility to electromagnetic interference
d) Limited range
Which wireless technology is used in short-range communication, like remote controls and wireless mice?
a) Microwave
b) Infrared
c) Radio waves
d) Satellite
What is the main function of a repeater in a network?
a) Convert digital data to analog
b) Amplify and regenerate weak signals
c) Distribute IP addresses
d) Route data between different networks
Which type of cable is commonly used in television signal transmission?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber cable
d) HDMI cable
What does WWW stand for in the context of web services?
a) World Web Window
b) World Wide Web
c) Wide World Web
d) Web Wide World
Which protocol governs the exchange of documents over the web?
a) FTP
b) SMTP
c) HTTP/HTTPS
d) IMAP
Which of the following is an example of a web browser?
a) Apache
b) Google Chrome
c) FTP Server
d) VPN
What does an IP address represent in networking?
a) The unique address of a document on the web
b) The location of a computer or device on the internet
c) The physical address of a server
d) A protocol for sending emails
Which of the following is an example of a URL (Uniform Resource Locator)?
a) 192.168.1.1
b) www.example.com
c) MAC address
d) HTML tag
What is the difference between an IP address and a URL?
a) IP addresses identify servers, URLs identify documents
b) IP addresses identify documents, URLs identify servers
c) URLs are numerical, IP addresses are text-based
d) Both are the same
What is the first page of a website typically called?
a) Homepage
b) Index page
c) Web server page
d) FTP page
Which protocol is used to transfer files from one server to another on the web?
a) HTTP
b) FTP
c) TCP
d) SMTP
What does the term "web hosting" refer to?
a) Designing web pages
b) Storing web pages on a server
c) Browsing the internet
d) Accessing email services
Which of the following is a client-side scripting language used to make web pages interactive?
a) PHP
b) JavaScript
c) SQL
d) Python
Which of the following is NOT an example of a server-side scripting language?
a) PHP
b) JSP
c) JavaScript
d) ASP
What is the main feature of Web 2.0 technologies?
a) Static websites
b) User interaction and content sharing
c) High-speed file transfers
d) Cloud computing
What does HTML stand for?
a) Hyperlink Text Markup Language
b) Hyper Text Markup Language
c) Hyper Transfer Markup Language
d) Hybrid Text Markup Language
Which markup language is primarily used to carry and exchange data rather than display it?
a) HTML
b) XML
c) SQL
d) CSS
Which of the following best describes a "domain name"?
a) A unique identifier for each website
b) A program used to browse the web
c) A collection of interlinked web pages
d) The physical address of a server
Which protocol is used by a web browser to communicate with a web server?
a) HTTP
b) DNS
c) FTP
d) SMTP
What is the role of a web server in web services?
a) Host multimedia content
b) Process client-side scripts
c) Respond to web browser requests
d) Manage emails
What does the term "URL" stand for?
a) Uniform Resource Locator
b) Uniform Resource Link
c) Unique Resource Locator
d) Unified Resource Location
What is an example of a web 2.0 application?
a) Google Docs
b) Microsoft Word
c) HTML editor
d) Linux terminal
Which of the following is a key difference between HTML and XML?
a) HTML is used to display data, XML is used to carry data
b) HTML is case-sensitive, XML is not
c) XML is only used for websites, while HTML is used for apps
d) HTML is a programming language, XML is a markup language
Which language is used to define the structure of web documents in Web 2.0?
a) HTML
b) CSS
c) XML
d) SQL
Which of the following statements is true for client-side scripts?
a) They are executed on the server
b) They are executed by the browser on the client’s computer
c) They are browser-independent
d) They are faster than server-side scripts
What is the main advantage of server-side scripting over client-side scripting?
a) It reduces server load
b) It is more secure
c) It provides better UI
d) It is faster
Which of the following topologies is most suited for fault-tolerant networks but may require the most cabling?
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology
In which type of network topology does each node connect to a central hub?
a) Ring topology
b) Star topology
c) Bus topology
d) Mesh topology
Which transmission medium is least affected by electromagnetic interference?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber
d) Satellite signals
Which device operates at the network layer of the OSI model and helps to determine the best path for data to travel?
a) Switch
b) Hub
c) Router
d) Repeater
What is the primary difference between a hub and a switch in networking?
a) A hub uses MAC addresses, while a switch uses IP addresses.
b) A switch transmits data in broadcast mode, while a hub transmits in unicast mode.
c) A hub forwards data to all connected devices, while a switch forwards data to specific devices.
d) A hub operates at Layer 3 of the OSI model, while a switch operates at Layer 2.
Which of the following is not a characteristic of TCP (Transmission Control Protocol)?
a) Reliable data transmission
b) Flow control
c) Connection-oriented
d) Unreliable delivery
Which protocol is primarily responsible for assigning IP addresses in a network?
a) DNS
b) DHCP
c) HTTP
d) FTP
Which of the following is a type of malware that locks your files and demands a ransom to restore access?
a) Virus
b) Worm
c) Trojan horse
d) Ransomware
What does a firewall primarily do in the context of network security?
a) Encrypt data for secure transmission
b) Detect and remove malware
c) Control incoming and outgoing network traffic based on predetermined rules
d) Monitor real-time data traffic to identify potential threats
Which type of cyberattack involves overwhelming a network with a flood of traffic, making services unavailable?
a) Phishing
b) Man-in-the-middle attack
c) Distributed Denial of Service (DDoS)
d) SQL Injection
Which of the following is true for a bus topology?
a) It provides the most fault tolerance.
b) It has a single point of failure at the central hub.
c) It uses a single backbone cable to connect all devices.
d) It is the most secure topology.
Which transmission medium provides the highest bandwidth for long-distance communication?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber
d) Wireless radio waves
What layer of the OSI model is responsible for encryption and decryption of data?
a) Data Link Layer
b) Transport Layer
c) Session Layer
d) Presentation Layer
Which of the following is NOT a type of network topology?
a) Mesh
b) Hybrid
c) Bus
d) Repeater
What is the primary purpose of a DNS (Domain Name System)?
a) To translate domain names to IP addresses
b) To assign MAC addresses to devices
c) To encrypt internet traffic
d) To provide fault tolerance in a network
Which device is used to connect different networks together?
a) Hub
b) Repeater
c) Switch
d) Router
Which of the following uses time division multiplexing (TDM) for transmission?
a) Fiber-optic cables
b) Ethernet cables
c) Satellite communication
d) Token Ring network
Which OSI layer ensures error-free data transmission between adjacent nodes?
a) Physical Layer
b) Network Layer
c) Data Link Layer
d) Transport Layer
Which device breaks up collision domains but not broadcast domains?
a) Hub
b) Switch
c) Router
d) Repeater
Which type of IP address is non-routable and used within private networks?
a) Public IP address
b) Private IP address
c) Dynamic IP address
d) Static IP address
Which of the following is NOT a secure wireless protocol?
a) WPA2
b) WEP
c) WPA
d) WPA3
What is the primary advantage of using fiber-optic cables over copper cables?
a) Higher flexibility
b) Resistance to electromagnetic interference
c) Easier to install
d) Lower cost
Which of the following protocols is used for secure file transfer over the internet?
a) HTTP
b) FTP
c) SFTP
d) DHCP
What is the function of ARP (Address Resolution Protocol)?
a) To assign IP addresses to devices
b) To resolve MAC addresses from IP addresses
c) To route data between different networks
d) To encrypt network traffic
Which network device operates at both Layer 2 and Layer 3 of the OSI model?
a) Hub
b) Switch
c) Repeater
d) Router
In which type of cyberattack does an attacker intercept communications between two parties?
a) Phishing
b) Man-in-the-middle attack
c) Denial of Service
d) Ransomware
Which of the following is a technique to break down a large network into smaller, more manageable subnetworks?
a) Fragmentation
b) Subnetting
c) Virtualization
d) Encryption
Which port number is used by HTTPS?
a) 21
b) 22
c) 443
d) 80
Which of the following protocols allows remote access to a computer using a secure connection?
a) Telnet
b) SSH
c) HTTP
d) POP3
Which of the following is a key feature of a VPN (Virtual Private Network)?
a) It improves internet speed.
b) It provides encryption and anonymity for users.
c) It blocks all types of malware.
d) It acts as a firewall.
Which of the following is NOT a function of a router?
a) Traffic forwarding
b) Packet switching
c) Network segmentation
d) Data encryption
What does IPsec (Internet Protocol Security) provide in a network?
a) Data integrity and confidentiality
b) Faster data transmission
c) Dynamic IP addressing
d) Network address translation
Which of the following protocols is responsible for ensuring data is delivered without errors and in the correct sequence?
a) UDP
b) FTP
c) TCP
d) IP
Which cybersecurity attack involves a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity?
a) Phishing
b) DDoS
c) Brute force attack
d) Keylogging
Which device amplifies and regenerates signals to extend the distance of a network?
a) Switch
b) Hub
c) Repeater
d) Router
Which of the following is true about a peer-to-peer network?
a) It requires a central server for communication.
b) It is highly scalable for large networks.
c) All devices have equal privileges.
d) It provides better security than a client-server network.
Which malware type disguises itself as legitimate software but performs harmful actions in the background?
a) Virus
b) Worm
c) Trojan horse
d) Ransomware
Which of the following can provide an added layer of security by allowing or denying traffic based on policies?
a) Router
b) Firewall
c) Hub
d) Switch
What is the purpose of NAT (Network Address Translation)?
a) To assign private IP addresses to devices
b) To allow multiple devices to share a single public IP address
c) To encrypt traffic on public networks
d) To establish VPN connections
Which of the following attacks exploits a vulnerability in databases by inserting malicious code?
a) SQL injection
b) Phishing
c) DDoS attack
d) Keylogging
What role does the Transport Layer of the OSI model play in networking?
a) Provides error checking and flow control
b) Defines hardware specifications for network communication
c) Routes packets across different networks
d) Encrypts data during transmission
Which of the following protocols is commonly used for sending email?
a) FTP
b) SMTP
c) IMAP
d) HTTP
What does a honeypot in cybersecurity refer to?
a) A malicious server used to attack hackers
b) A system set up to attract attackers and study their methods
c) A secure network node to redirect traffic
d) An encrypted database storing sensitive data
Which term refers to the unauthorized access of network resources?
a) Hacking
b) Phishing
c) Encryption
d) VPN
What is the primary function of a VLAN (Virtual Local Area Network)?
a) Provides secure remote access
b) Segments a network into smaller, isolated sections
c) Encrypts all network traffic
d) Reduces bandwidth usage
Which of the following is a principle of the CIA triad in cybersecurity?
a) Access control
b) Integrity
c) Non-repudiation
d) Redundancy
Which of the following is a distributed computing framework for processing large datasets?
a) OSI model
b) Hadoop
c) SMTP
d) DHCP
What is the main purpose of a proxy server?
a) To encrypt communications
b) To forward requests and responses between clients and servers
c) To act as a firewall
d) To directly transfer files between computers
Which cybersecurity practice involves identifying weaknesses in a network before attackers can exploit them?
a) Phishing
b) Penetration testing
c) Ransomware
d) Social engineering
Which of the following protocols is used for securing communication over a computer network?
a) HTTP
b) FTP
c) IPsec
d) DHCP
Which network security tool monitors traffic in real time to detect suspicious activity?
a) Firewall
b) IDS (Intrusion Detection System)
c) Router
d) NAT
Which of the following is an attack that attempts to crack encrypted data by trying every possible combination?
a) Brute force attack
b) Phishing
c) DDoS attack
d) Malware injection
Which of the following cybersecurity principles ensures that data has not been altered or tampered with?
a) Confidentiality
b) Integrity
c) Availability
d) Redundancy
Which of the following protocols is used for downloading emails from a server to a local client?
a) SMTP
b) IMAP
c) FTP
d) DNS
Which type of malware replicates itself without any human intervention?
a) Virus
b) Worm
c) Trojan horse
d) Spyware
What is the primary difference between UDP and TCP?
a) TCP is connection-oriented, while UDP is connectionless.
b) UDP ensures reliable data transfer, while TCP does not.
c) UDP operates at the Data Link Layer, while TCP operates at the Network Layer.
d) TCP is faster than UDP.
Which of the following is an advantage of IPv6 over IPv4?
a) Shorter addresses
b) Larger address space
c) Less secure protocol
d) Faster data transmission
Which of the following security measures prevents unauthorized access to a network?
a) MAC filtering
b) ARP spoofing
c) DHCP snooping
d) Subnetting
What is a key characteristic of a cloud-based network?
a) All data is stored locally.
b) Services are available over the internet.
c) It requires specialized hardware.
d) It is slower than traditional networks.
Which of the following refers to a system that automatically detects and responds to security incidents in real-time?
a) IDS
b) IPS (Intrusion Prevention System)
c) Proxy server
d) NAT
What is the primary function of a Network Interface Card (NIC)?
a) Connect multiple computers in a LAN
b) Convert analog signals to digital
c) Connect a computer to a network
d) Amplify weak signals in a network
Which device converts digital data to analog signals for transmission over telephone lines?
a) Hub
b) Repeater
c) Modem
d) Router
What type of connector is typically used for connecting computers in a LAN using twisted-pair cables?
a) RJ-11
b) RJ-45
c) HDMI
d) USB
Which device is commonly used to regenerate weak signals in a network?
a) Switch
b) Hub
c) Repeater
d) Gateway
What is a significant disadvantage of using a hub in a network?
a) It broadcasts data to all connected devices.
b) It only supports wireless networks.
c) It only connects two devices.
d) It is too expensive to deploy.
Which device intelligently forwards data only to the intended recipient in a network?
a) Hub
b) Switch
c) Repeater
d) Router
A wireless access point (WAP) allows devices to connect to a network using which technology?
a) Bluetooth
b) Wi-Fi
c) Ethernet
d) Coaxial cables
Which device is used to connect two different types of networks?
a) Hub
b) Switch
c) Router
d) Gateway
Which of the following is an example of wired transmission media?
a) Radio waves
b) Optical fiber
c) Infrared waves
d) Microwaves
What type of transmission media is best suited for long-distance, high-bandwidth communication?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber
d) Radio waves
Which cable is made of copper and is twisted to reduce interference?
a) Coaxial cable
b) Optical fiber cable
c) Twisted-pair cable
d) Ethernet cable
Which of the following is NOT an example of wireless transmission media?
a) Microwave
b) Optical fiber
c) Infrared waves
d) Satellite link
Which transmission media has the highest resistance to electromagnetic interference (EMI)?
a) Twisted-pair cable
b) Coaxial cable
c) Optical fiber cable
d) Microwave signals
What is the main disadvantage of using optical fiber cables?
a) Low bandwidth
b) High cost and complexity
c) Susceptibility to electromagnetic interference
d) Limited range
Which wireless technology is used in short-range communication, like remote controls and wireless mice?
a) Microwave
b) Infrared
c) Radio waves
d) Satellite
What is the main function of a repeater in a network?
a) Convert digital data to analog
b) Amplify and regenerate weak signals
c) Distribute IP addresses
d) Route data between different networks
Which type of cable is commonly used in television signal transmission?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber cable
d) HDMI cable
What does WWW stand for in the context of web services?
a) World Web Window
b) World Wide Web
c) Wide World Web
d) Web Wide World
Which protocol governs the exchange of documents over the web?
a) FTP
b) SMTP
c) HTTP/HTTPS
d) IMAP
Which of the following is an example of a web browser?
a) Apache
b) Google Chrome
c) FTP Server
d) VPN
What does an IP address represent in networking?
a) The unique address of a document on the web
b) The location of a computer or device on the internet
c) The physical address of a server
d) A protocol for sending emails
Which of the following is an example of a URL (Uniform Resource Locator)?
a) 192.168.1.1
b) www.example.com
c) MAC address
d) HTML tag
What is the difference between an IP address and a URL?
a) IP addresses identify servers, URLs identify documents
b) IP addresses identify documents, URLs identify servers
c) URLs are numerical, IP addresses are text-based
d) Both are the same
What is the first page of a website typically called?
a) Homepage
b) Index page
c) Web server page
d) FTP page
Which protocol is used to transfer files from one server to another on the web?
a) HTTP
b) FTP
c) TCP
d) SMTP
What does the term "web hosting" refer to?
a) Designing web pages
b) Storing web pages on a server
c) Browsing the internet
d) Accessing email services
Which of the following is a client-side scripting language used to make web pages interactive?
a) PHP
b) JavaScript
c) SQL
d) Python
Which of the following is NOT an example of a server-side scripting language?
a) PHP
b) JSP
c) JavaScript
d) ASP
What is the main feature of Web 2.0 technologies?
a) Static websites
b) User interaction and content sharing
c) High-speed file transfers
d) Cloud computing
What does HTML stand for?
a) Hyperlink Text Markup Language
b) Hyper Text Markup Language
c) Hyper Transfer Markup Language
d) Hybrid Text Markup Language
Which markup language is primarily used to carry and exchange data rather than display it?
a) HTML
b) XML
c) SQL
d) CSS
Which of the following best describes a "domain name"?
a) A unique identifier for each website
b) A program used to browse the web
c) A collection of interlinked web pages
d) The physical address of a server
Which protocol is used by a web browser to communicate with a web server?
a) HTTP
b) DNS
c) FTP
d) SMTP
What is the role of a web server in web services?
a) Host multimedia content
b) Process client-side scripts
c) Respond to web browser requests
d) Manage emails
What does the term "URL" stand for?
a) Uniform Resource Locator
b) Uniform Resource Link
c) Unique Resource Locator
d) Unified Resource Location
What is an example of a web 2.0 application?
a) Google Docs
b) Microsoft Word
c) HTML editor
d) Linux terminal
Which of the following is a key difference between HTML and XML?
a) HTML is used to display data, XML is used to carry data
b) HTML is case-sensitive, XML is not
c) XML is only used for websites, while HTML is used for apps
d) HTML is a programming language, XML is a markup language
Which language is used to define the structure of web documents in Web 2.0?
a) HTML
b) CSS
c) XML
d) SQL
Which of the following statements is true for client-side scripts?
a) They are executed on the server
b) They are executed by the browser on the client’s computer
c) They are browser-independent
d) They are faster than server-side scripts
What is the main advantage of server-side scripting over client-side scripting?
a) It reduces server load
b) It is more secure
c) It provides better UI
d) It is faster