Q1. Which layer of the OSI Model is responsible for the physical connection between devices and the transmission of raw bits?
A) Data Link Layer
B) Network Layer
C) Physical Layer
D) Transport Layer
E) Application Layer
Answer: C
Q2. In which network topology is there a central controller or hub to which every other node is connected?
A) Bus Topology
B) Ring Topology
C) Star Topology
D) Mesh Topology
E) Tree Topology
Answer: C
Q3. What is the full form of NIC, a hardware component essential for connecting a computer to a network?
A) Network Internal Card
B) Network Interface Card
C) New Internet Connection
D) Network Interconnection Chip
E) Network Integration Circuit
Answer: B
Q4. A unique 48-bit address assigned to the Network Interface Card (NIC) by the manufacturer is known as the:
A) IP Address
B) MAC Address (Media Access Control)
C) Port Address
D) DNS Address
E) URL
Answer: B
Q5. Which networking device operates at the Data Link Layer (Layer 2) and filters traffic based on MAC addresses?
A) Hub
B) Switch
C) Repeater
D) Amplifier
E) Passive Hub
Answer: B
Q6. The internet is the largest example of which type of network?
A) LAN
B) MAN
C) WAN
D) PAN
E) SAN
Answer: C (Wide Area Network).
Q7. Which device is required to connect a digital computer to an analog telephone line for internet access?
A) Router
B) Switch
C) Modem
D) Hub
E) Bridge
Answer: C (Modulator-Demodulator).
Q8. In the OSI model, which layer is responsible for logical addressing (IP Addressing) and routing packets?
A) Physical Layer
B) Data Link Layer
C) Network Layer
D) Session Layer
E) Presentation Layer
Answer: C
Q9. Which protocol is used for browsing the web (transferring hypertext)?
A) FTP
B) SMTP
C) HTTP
D) SNMP
E) Telnet
Answer: C (HyperText Transfer Protocol).
Q10. Bluetooth is an example of which type of network?
A) LAN
B) WAN
C) PAN (Personal Area Network)
D) MAN
E) VPN
Answer: C
Q11. Which topology requires the most amount of cabling and is the most expensive to implement?
A) Star
B) Bus
C) Ring
D) Mesh
E) Tree
Answer: D (Every node connects to every other node).
Q12. What is the function of a Repeater in a network?
A) To route traffic.
B) To assign IP addresses.
C) To regenerate or boost the signal to extend the network's range.
D) To block viruses.
E) To compress data.
Answer: C
Q13. IPv4 addresses consist of how many bits?
A) 16 bits
B) 32 bits
C) 48 bits
D) 64 bits
E) 128 bits
Answer: B (e.g., 192.168.1.1).
Q14. IPv6 addresses consist of how many bits?
A) 32 bits
B) 64 bits
C) 128 bits
D) 256 bits
E) 1024 bits
Answer: C (Created because we ran out of IPv4).
Q15. Which device connects two networks that use different protocols (like translating between AppleTalk and TCP/IP)?
A) Bridge
B) Gateway
C) Switch
D) Hub
E) Repeater
Answer: B (The "Translator").
Q16. What does the acronym TCP/IP stand for?
A) Transmission Control Protocol / Internet Protocol
B) Transfer Control Protocol / Internal Protocol
C) Transmission Central Protocol / International Protocol
D) Transaction Control Point / Internet Point
E) Technical Connection Protocol / Internet Protocol
Answer: A
Q17. In Half-Duplex transmission mode:
A) Data flows in one direction only (like a Radio).
B) Data flows in both directions, but not at the same time (like a Walkie-Talkie).
C) Data flows in both directions simultaneously (like a Phone).
D) Data does not flow.
E) Data is broadcast to everyone.
Answer: B
Q18. The "Bus Topology" uses terminators at the ends of the cable to:
A) Boost the signal.
B) Prevent signal reflection (bouncing back) which causes interference.
C) Connect more computers.
D) Power the network.
E) Encrypt data.
Answer: B
Q19. Which command is used to check the connectivity between two computers on a network (measuring latency)?
A) ipconfig
B) ping
C) netstat
D) tracert
E) nslookup
Answer: B
Q20. Which layer of the OSI model ensures reliable, error-free delivery of data (Flow Control)?
A) Network Layer
B) Transport Layer
C) Session Layer
D) Application Layer
E) Physical Layer
Answer: B
Q21. URL stands for:
A) Uniform Resource Locator
B) Universal Resource Link
C) Uniform Registered Link
D) Universal Registered Locator
E) United Resource Locator
Answer: A
Q22. Which protocol is primarily used for sending emails?
A) POP3
B) HTTP
C) FTP
D) SMTP (Simple Mail Transfer Protocol)
E) IMAP
Answer: D (SMTP sends; POP3/IMAP receive).
Q23. A "Firewall" is used in a network to:
A) Cool down the servers.
B) Prevent unauthorized access and filter traffic.
C) Increase internet speed.
D) Connect cables.
E) Store emails.
Answer: B
Q24. In a Ring Topology, data travels in:
A) Both directions simultaneously.
B) Random directions.
C) One direction only (Unidirectional).
D) Star formation.
E) A mesh pattern.
Answer: C
Q25. Which device acts as a centralized connection point but broadcasts data to ALL connected ports (a "dumb" device)?
A) Switch
B) Hub
C) Router
D) Gateway
E) Bridge
Answer: B
Q26. DNS stands for:
A) Domain Name System
B) Data Network Service
C) Digital Name Server
D) Domain Number System
E) Data Name Source
Answer: A (Translates names like google.com to IP addresses).
Q27. The physical arrangement of cables and devices in a network is called:
A) Protocol
B) Architecture
C) Topology
D) Transmission
E) Media
Answer: C
Q28. Which cable uses light waves to transmit data and is immune to electromagnetic interference?
A) Coaxial Cable
B) Twisted Pair Cable (UTP)
C) Fiber Optic Cable
D) Ethernet Cable
E) Shielded Pair Cable
Answer: C
Q29. What is the standard connector used for Ethernet cables (UTP)?
A) RJ-11
B) RJ-45
C) USB
D) HDMI
E) VGA
Answer: B (RJ-11 is for Telephones).
Q30. "Parity Checking" is a method used for:
A) Error Detection
B) Error Correction
C) Encryption
D) Compression
E) Routing
Answer: A
Q31. Which layer of the OSI model handles data encryption and decryption?
A) Application
B) Presentation
C) Session
D) Transport
E) Network
Answer: B
Q32. A private network inside a company that uses internet technology (like web pages) but is restricted to employees is called a(n):
A) Internet
B) Intranet
C) Extranet
D) Ethernet
E) Ultranet
Answer: B
Q33. Which network spans a large geographical area, often using telephone lines or satellites?
A) LAN
B) MAN
C) WAN
D) WLAN
E) PAN
Answer: C
Q34. The data unit at the Transport Layer is called a:
A) Bit
B) Frame
C) Packet
D) Segment
E) Message
Answer: D
Q35. The data unit at the Network Layer is called a:
A) Bit
B) Frame
C) Packet
D) Segment
E) User Datagram
Answer: C
Q36. DHCP stands for:
A) Dynamic Host Configuration Protocol
B) Dual Host Control Protocol
C) Domain Host Connection Protocol
D) Digital Host Communication Protocol
E) Dynamic Hypertext Control Protocol
Answer: A (Automatically assigns IP addresses).
Q37. Which of the following is NOT a Guided Media (Wired)?
A) Twisted Pair
B) Coaxial Cable
C) Fiber Optics
D) Microwaves
E) Telephone Wire
Answer: D (Microwaves are wireless/unguided).
Q38. "Bandwidth" refers to:
A) The physical width of the cable.
B) The data transfer capacity of a network.
C) The length of the cable.
D) The number of computers connected.
E) The cost of the internet.
Answer: B
Q39. What is the purpose of the "Subnet Mask"?
A) To hide the IP address.
B) To distinguish the Network portion from the Host portion of an IP address.
C) To encrypt the data.
D) To speed up the router.
E) To block viruses.
Answer: B
Q40. FTP stands for:
A) File Transfer Protocol
B) Fast Text Processing
C) File Transmission Program
D) Folder Transfer Protocol
E) File Text Protocol
Answer: A
Q41. A network that connects a city (like a cable TV network) is a:
A) LAN
B) WAN
C) MAN
D) PAN
E) SAN
Answer: C
Q42. Which topology stops working completely if the main backbone cable breaks?
A) Star
B) Bus
C) Mesh
D) Ring
E) Hybrid
Answer: B
Q43. The "CSMA/CD" access method is used in Ethernet. What does "CD" stand for?
A) Collision Detection
B) Carrier Definition
C) Code Division
D) Control Data
E) Compact Disk
Answer: A (Carrier Sense Multiple Access / Collision Detection).
Q44. Which layer defines how to establish, maintain, and terminate a conversation between applications?
A) Application
B) Presentation
C) Session
D) Transport
E) Network
Answer: C
Q45. An IP address of 192.168.1.1 belongs to which Class?
A) Class A
B) Class B
C) Class C
D) Class D
E) Class E
Answer: C (Class C range: 192-223).
Q46. A "Bridge" operates at which layer of the OSI model?
A) Physical
B) Data Link
C) Network
D) Transport
E) Session
Answer: B (Connects LAN segments).
Q47. Which protocol is connection-oriented and guarantees delivery?
A) UDP (User Datagram Protocol)
B) TCP (Transmission Control Protocol)
C) IP
D) ICMP
E) ARP
Answer: B (UDP is connectionless and does not guarantee delivery).
Q48. The speed of a Supercomputer network or Fiber Optic is typically measured in:
A) Kbps
B) Mbps
C) Gbps or Tbps (Gigabits/Terabits per second)
D) Hz
E) RPM
Answer: C
Q49. Which command displays the MAC address of your computer?
A) ipconfig /all (Windows)
B) ping
C) tracert
D) netstat
E) telnet
Answer: A (Or ifconfig in Linux/Mac).
Q50. A "Proxy Server" is used to:
A) Speed up the CPU.
B) Act as an intermediary for requests from clients seeking resources from other servers (providing anonymity or filtering).
C) Store files permanently.
D) Connect cables.
E) Generate IP addresses.
Answer: B
Q51. Which device is used to connect two LANs with the same protocol?
A) Router
B) Gateway
C) Bridge
D) Modem
E) Repeater
Answer: C
Q52. Which device is used to connect two networks with different protocols (e.g., AppleTalk to TCP/IP)?
A) Bridge
B) Switch
C) Gateway
D) Hub
E) Repeater
Answer: C (Gateway acts as a translator).
Q53. In a Star Topology, if the central Hub/Switch fails, what happens?
A) Only one computer stops working.
B) The entire network goes down.
C) Data travels to the next hub.
D) The network switches to Ring topology.
E) Nothing happens.
Answer: B
Q54. 10Base-T refers to:
A) 10 Mbps speed over Twisted Pair cable.
B) 10 GBps speed.
C) 10 Computers connected.
D) 10 Meter long cable.
E) 10 Base stations.
Answer: A
Q55. Which of the following is a private IP address range (Class C)?
A) 10.0.0.0 to 10.255.255.255
B) 172.16.0.0 to 172.31.255.255
C) 192.168.0.0 to 192.168.255.255
D) 8.8.8.8
E) 127.0.0.1
Answer: C
Q56. The Loopback IP address used for testing the network card (localhost) is:
A) 192.168.1.1
B) 127.0.0.1
C) 10.0.0.1
D) 255.255.255.0
E) 0.0.0.0
Answer: B
Q57. Which protocol resolves an IP address to a MAC address?
A) DNS
B) DHCP
C) ARP (Address Resolution Protocol)
D) RARP
E) ICMP
Answer: C
Q58. Which protocol resolves a MAC address to an IP address?
A) ARP
B) RARP (Reverse ARP)
C) DNS
D) HTTP
E) SMTP
Answer: B
Q59. The length of a MAC address is:
A) 32 bits
B) 48 bits (6 Bytes)
C) 64 bits
D) 128 bits
E) 16 bits
Answer: B
Q60. Which switching technique breaks data into small fixed-size units called "cells"?
A) Circuit Switching
B) Packet Switching
C) Message Switching
D) ATM (Asynchronous Transfer Mode)
E) Ethernet
Answer: D
Q61. In Fiber Optic cables, data is transmitted as:
A) Electrical pulses.
B) Radio waves.
C) Light pulses.
D) Sound waves.
E) Magnetic fields.
Answer: C
Q62. "Crosstalk" in networking refers to:
A) People talking over each other.
B) Interference caused by signals jumping from one wire to another.
C) A type of virus.
D) Connecting cables crosswise.
E) Encryption failure.
Answer: B
Q63. Which layer of the TCP/IP model corresponds to the OSI's Data Link and Physical layers combined?
A) Application Layer
B) Transport Layer
C) Internet Layer
D) Network Interface (or Network Access) Layer
E) Hardware Layer
Answer: D
Q64. What is the maximum length of a standard UTP cable segment (CAT5/CAT6) before signal loss occurs?
A) 10 meters
B) 50 meters
C) 100 meters
D) 500 meters
E) 1 kilometer
Answer: C
Q65. A "Packet" contains:
A) Only Data.
B) Only Source Address.
C) Only Destination Address.
D) Header (Source IP, Destination IP) + Payload (Data) + Trailer.
E) Only Error codes.
Answer: D
Q66. Which wireless standard is known as Wi-Fi?
A) IEEE 802.3
B) IEEE 802.5
C) IEEE 802.11
D) IEEE 802.15
E) IEEE 1394
Answer: C (802.3 is Ethernet).
Q67. "Bluetooth" standard is defined by:
A) IEEE 802.11
B) IEEE 802.15.1
C) IEEE 802.3
D) IEEE 802.16
E) IEEE 802.20
Answer: B
Q68. Which device is used to boost a signal in a wireless network?
A) Wireless Repeater / Range Extender
B) Switch
C) Modem
D) Firewall
E) Hub
Answer: A
Q69. The command "tracert" (Windows) or "traceroute" (Linux) is used to:
A) Check your own IP.
B) Show the path (hops) a packet takes to reach a destination.
C) Trace a hacker.
D) Find a file.
E) Measure internet speed.
Answer: B
Q70. Which protocol is used for secure web browsing (Encrypted HTTP)?
A) HTTP
B) HTTPS (Hyper Text Transfer Protocol Secure)
C) S-HTTP
D) SSH
E) SFTP
Answer: B (Uses SSL/TLS).
Q71. Port number 80 is reserved for:
A) FTP
B) SMTP
C) HTTP
D) HTTPS
E) Telnet
Answer: C
Q72. Port number 443 is reserved for:
A) HTTP
B) HTTPS
C) FTP
D) DNS
E) SSH
Answer: B
Q73. Port number 25 is reserved for:
A) SMTP (Email sending)
B) POP3
C) IMAP
D) FTP
E) Telnet
Answer: A
Q74. Which cable allows transmission speeds of 10 Gbps and higher over short distances in data centers?
A) Coaxial
B) Cat 3
C) Cat 6a / Cat 7 / Fiber
D) Telephone wire
E) USB cable
Answer: C
Q75. The "Domain Name System" (DNS) structure is:
A) Flat
B) Hierarchical (Root -> Top Level -> Second Level)
C) Linear
D) Circular
E) Random
Answer: B
Q76. Which of the following is a Top-Level Domain (TLD)?
A) www
B) google
C) .com
D) http://
E) index.html
Answer: C
Q77. What is "Phishing"?
A) Connecting to a network.
B) A cyber attack trying to trick you into revealing sensitive info (passwords) by pretending to be a trustworthy entity.
C) Installing software.
D) Cleaning a mouse.
E) A type of fishing game.
Answer: B
Q78. In which mode can data be transmitted in both directions simultaneously?
A) Simplex
B) Half-Duplex
C) Full-Duplex
D) Semi-Duplex
E) Complex
Answer: C
Q79. Which network device is essentially a multiport repeater?
A) Switch
B) Active Hub
C) Router
D) Gateway
E) Bridge
Answer: B
Q80. "Attenuation" refers to:
A) Strengthening of signal.
B) Loss of signal strength as it travels.
C) Speed of signal.
D) Delay of signal.
E) Encryption of signal.
Answer: B
Q81. The term "Node" in a network refers to:
A) The cable.
B) Any device (Computer, Printer) connected to the network.
C) The power supply.
D) The software.
E) The internet.
Answer: B
Q82. Which protocol is used to download files from a server?
A) SMTP
B) FTP
C) SNMP
D) UDP
E) ARP
Answer: B
Q83. A "MAC Address" is also known as:
A) Logical Address
B) Physical Address
C) Internet Address
D) Memory Address
E) Port Address
Answer: B
Q84. What does "ISDN" stand for?
A) Integrated Services Digital Network
B) Internal System Digital Network
C) International Standard Digital Network
D) Internet Service Data Network
E) Integrated System Data Node
Answer: A
Q85. Which transmission media is most affected by electromagnetic interference (EMI)?
A) Fiber Optic
B) Unshielded Twisted Pair (UTP)
C) Coaxial
D) Shielded Twisted Pair
E) Wireless
Answer: B (Unshielded copper acts like an antenna).
Q86. "Latency" is:
A) The speed of download.
B) The time delay for a data packet to travel from source to destination.
C) The width of the cable.
D) The cost of data.
E) The size of the packet.
Answer: B
Q87. Which protocol is stateless?
A) TCP
B) HTTP
C) FTP
D) SMTP
E) Telnet
Answer: B (The server forgets the client once the request is fulfilled, unless cookies are used).
Q88. MIME stands for:
A) Multipurpose Internet Mail Extensions
B) Multi Internet Mail Email
C) Multiple Interface Mail Extensions
D) Mail Internet Media Extension
E) Main Internet Mail Engine
Answer: A (Allows email to send non-text data like photos).
Q89. Which OSI layer handles "Dialog Control" and "Token Management"?
A) Session Layer
B) Transport Layer
C) Network Layer
D) Data Link Layer
E) Physical Layer
Answer: A
Q90. Which device reduces network traffic (Collision domains) by breaking a LAN into segments?
A) Hub
B) Switch (or Bridge)
C) Repeater
D) Modem
E) Cable
Answer: B (Switches create separate collision domains for each port).
Q91. What is the standard port for Telnet (Unsecure remote login)?
A) 21
B) 22
C) 23
D) 25
E) 80
Answer: C
Q92. What is the standard port for SSH (Secure Shell)?
A) 21
B) 22
C) 23
D) 80
E) 443
Answer: B
Q93. "Token Ring" is a standard defined by:
A) IEEE 802.3
B) IEEE 802.5
C) IEEE 802.11
D) IEEE 802.15
E) IEEE 802.1
Answer: B
Q94. A "Backbone" in a network is:
A) The main cable that connects different segments of a network together.
B) The power cord.
C) The server.
D) The user manual.
E) The firewall.
Answer: A
Q95. Which type of fiber optic cable allows multiple light paths and is used for shorter distances (LANs)?
A) Single Mode
B) Multi-Mode
C) Dual Mode
D) Quad Mode
E) Short Mode
Answer: B (Single mode is for long-distance WANs).
Q96. What is "Spoofing"?
A) Cleaning the cache.
B) A technique where an attacker disguises themselves as a trusted source (e.g., faking an IP address).
C) Speeding up the network.
D) Encrypting data.
E) Compressing files.
Answer: B
Q97. The process of converting Digital signals to Analog is called:
A) Modulation
B) Demodulation
C) Digitization
D) Encoding
E) Decoding
Answer: A (Demodulation is Analog to Digital).
Q98. "Bit Rate" refers to:
A) The cost of a bit.
B) The number of bits transmitted per second.
C) The error rate.
D) The voltage of a bit.
E) The storage size.
Answer: B
Q99. Which of the following is NOT a network topology?
A) Bus
B) Star
C) Ring
D) Circle (The correct term is Ring)
E) Car (Not a topology)
Answer: E (Trick question - "Ring" is the formal term, "Circle" is usually accepted loosely, but "Car" is definitely wrong).
Q100. "VPN" stands for:
A) Virtual Public Network
B) Visual Private Network
C) Virtual Private Network
D) Virtual Personal Network
E) Visual Public Node
Answer: C
0 Comments
Post a Comment