Q1. Which layer of the OSI Model is responsible for the physical connection between devices and the transmission of raw bits?

A) Data Link Layer

B) Network Layer

C) Physical Layer

D) Transport Layer

E) Application Layer

Answer: C

 

Q2. In which network topology is there a central controller or hub to which every other node is connected?

A) Bus Topology

B) Ring Topology

C) Star Topology

D) Mesh Topology

E) Tree Topology

Answer: C

 

Q3. What is the full form of NIC, a hardware component essential for connecting a computer to a network?

A) Network Internal Card

B) Network Interface Card

C) New Internet Connection

D) Network Interconnection Chip

E) Network Integration Circuit

Answer: B

 

Q4. A unique 48-bit address assigned to the Network Interface Card (NIC) by the manufacturer is known as the:

A) IP Address

B) MAC Address (Media Access Control)

C) Port Address

D) DNS Address

E) URL

Answer: B

 

Q5. Which networking device operates at the Data Link Layer (Layer 2) and filters traffic based on MAC addresses?

A) Hub

B) Switch

C) Repeater

D) Amplifier

E) Passive Hub

Answer: B

 

Q6. The internet is the largest example of which type of network?

A) LAN

B) MAN

C) WAN

D) PAN

E) SAN

Answer: C (Wide Area Network).

 

Q7. Which device is required to connect a digital computer to an analog telephone line for internet access?

A) Router

B) Switch

C) Modem

D) Hub

E) Bridge

Answer: C (Modulator-Demodulator).

 

Q8. In the OSI model, which layer is responsible for logical addressing (IP Addressing) and routing packets?

A) Physical Layer

B) Data Link Layer

C) Network Layer

D) Session Layer

E) Presentation Layer

Answer: C

 

Q9. Which protocol is used for browsing the web (transferring hypertext)?

A) FTP

B) SMTP

C) HTTP

D) SNMP

E) Telnet

Answer: C (HyperText Transfer Protocol).

 

Q10. Bluetooth is an example of which type of network?

A) LAN

B) WAN

C) PAN (Personal Area Network)

D) MAN

E) VPN

Answer: C

 

Q11. Which topology requires the most amount of cabling and is the most expensive to implement?

A) Star

B) Bus

C) Ring

D) Mesh

E) Tree

Answer: D (Every node connects to every other node).

 

Q12. What is the function of a Repeater in a network?

A) To route traffic.

B) To assign IP addresses.

C) To regenerate or boost the signal to extend the network's range.

D) To block viruses.

E) To compress data.

Answer: C

 

Q13. IPv4 addresses consist of how many bits?

A) 16 bits

B) 32 bits

C) 48 bits

D) 64 bits

E) 128 bits

Answer: B (e.g., 192.168.1.1).

 

Q14. IPv6 addresses consist of how many bits?

A) 32 bits

B) 64 bits

C) 128 bits

D) 256 bits

E) 1024 bits

Answer: C (Created because we ran out of IPv4).

 

Q15. Which device connects two networks that use different protocols (like translating between AppleTalk and TCP/IP)?

A) Bridge

B) Gateway

C) Switch

D) Hub

E) Repeater

Answer: B (The "Translator").

 

Q16. What does the acronym TCP/IP stand for?

A) Transmission Control Protocol / Internet Protocol

B) Transfer Control Protocol / Internal Protocol

C) Transmission Central Protocol / International Protocol

D) Transaction Control Point / Internet Point

E) Technical Connection Protocol / Internet Protocol

Answer: A

 

Q17. In Half-Duplex transmission mode:

A) Data flows in one direction only (like a Radio).

B) Data flows in both directions, but not at the same time (like a Walkie-Talkie).

C) Data flows in both directions simultaneously (like a Phone).

D) Data does not flow.

E) Data is broadcast to everyone.

Answer: B

 

Q18. The "Bus Topology" uses terminators at the ends of the cable to:

A) Boost the signal.

B) Prevent signal reflection (bouncing back) which causes interference.

C) Connect more computers.

D) Power the network.

E) Encrypt data.

Answer: B

 

Q19. Which command is used to check the connectivity between two computers on a network (measuring latency)?

A) ipconfig

B) ping

C) netstat

D) tracert

E) nslookup

Answer: B

 

Q20. Which layer of the OSI model ensures reliable, error-free delivery of data (Flow Control)?

A) Network Layer

B) Transport Layer

C) Session Layer

D) Application Layer

E) Physical Layer

Answer: B

 

Q21. URL stands for:

A) Uniform Resource Locator

B) Universal Resource Link

C) Uniform Registered Link

D) Universal Registered Locator

E) United Resource Locator

Answer: A

 

Q22. Which protocol is primarily used for sending emails?

A) POP3

B) HTTP

C) FTP

D) SMTP (Simple Mail Transfer Protocol)

E) IMAP

Answer: D (SMTP sends; POP3/IMAP receive).

 

Q23. A "Firewall" is used in a network to:

A) Cool down the servers.

B) Prevent unauthorized access and filter traffic.

C) Increase internet speed.

D) Connect cables.

E) Store emails.

Answer: B

 

Q24. In a Ring Topology, data travels in:

A) Both directions simultaneously.

B) Random directions.

C) One direction only (Unidirectional).

D) Star formation.

E) A mesh pattern.

Answer: C

 

Q25. Which device acts as a centralized connection point but broadcasts data to ALL connected ports (a "dumb" device)?

A) Switch

B) Hub

C) Router

D) Gateway

E) Bridge

Answer: B

 

Q26. DNS stands for:

A) Domain Name System

B) Data Network Service

C) Digital Name Server

D) Domain Number System

E) Data Name Source

Answer: A (Translates names like google.com to IP addresses).

 

Q27. The physical arrangement of cables and devices in a network is called:

A) Protocol

B) Architecture

C) Topology

D) Transmission

E) Media

Answer: C

 

Q28. Which cable uses light waves to transmit data and is immune to electromagnetic interference?

A) Coaxial Cable

B) Twisted Pair Cable (UTP)

C) Fiber Optic Cable

D) Ethernet Cable

E) Shielded Pair Cable

Answer: C

 

Q29. What is the standard connector used for Ethernet cables (UTP)?

A) RJ-11

B) RJ-45

C) USB

D) HDMI

E) VGA

Answer: B (RJ-11 is for Telephones).

 

Q30. "Parity Checking" is a method used for:

A) Error Detection

B) Error Correction

C) Encryption

D) Compression

E) Routing

Answer: A

 

Q31. Which layer of the OSI model handles data encryption and decryption?

A) Application

B) Presentation

C) Session

D) Transport

E) Network

Answer: B

 

Q32. A private network inside a company that uses internet technology (like web pages) but is restricted to employees is called a(n):

A) Internet

B) Intranet

C) Extranet

D) Ethernet

E) Ultranet

Answer: B

 

Q33. Which network spans a large geographical area, often using telephone lines or satellites?

A) LAN

B) MAN

C) WAN

D) WLAN

E) PAN

Answer: C

 

Q34. The data unit at the Transport Layer is called a:

A) Bit

B) Frame

C) Packet

D) Segment

E) Message

Answer: D

 

Q35. The data unit at the Network Layer is called a:

A) Bit

B) Frame

C) Packet

D) Segment

E) User Datagram

Answer: C

 

Q36. DHCP stands for:

A) Dynamic Host Configuration Protocol

B) Dual Host Control Protocol

C) Domain Host Connection Protocol

D) Digital Host Communication Protocol

E) Dynamic Hypertext Control Protocol

Answer: A (Automatically assigns IP addresses).

 

Q37. Which of the following is NOT a Guided Media (Wired)?

A) Twisted Pair

B) Coaxial Cable

C) Fiber Optics

D) Microwaves

E) Telephone Wire

Answer: D (Microwaves are wireless/unguided).

 

Q38. "Bandwidth" refers to:

A) The physical width of the cable.

B) The data transfer capacity of a network.

C) The length of the cable.

D) The number of computers connected.

E) The cost of the internet.

Answer: B

 

Q39. What is the purpose of the "Subnet Mask"?

A) To hide the IP address.

B) To distinguish the Network portion from the Host portion of an IP address.

C) To encrypt the data.

D) To speed up the router.

E) To block viruses.

Answer: B

 

Q40. FTP stands for:

A) File Transfer Protocol

B) Fast Text Processing

C) File Transmission Program

D) Folder Transfer Protocol

E) File Text Protocol

Answer: A

 

Q41. A network that connects a city (like a cable TV network) is a:

A) LAN

B) WAN

C) MAN

D) PAN

E) SAN

Answer: C

 

Q42. Which topology stops working completely if the main backbone cable breaks?

A) Star

B) Bus

C) Mesh

D) Ring

E) Hybrid

Answer: B

 

Q43. The "CSMA/CD" access method is used in Ethernet. What does "CD" stand for?

A) Collision Detection

B) Carrier Definition

C) Code Division

D) Control Data

E) Compact Disk

Answer: A (Carrier Sense Multiple Access / Collision Detection).

 

Q44. Which layer defines how to establish, maintain, and terminate a conversation between applications?

A) Application

B) Presentation

C) Session

D) Transport

E) Network

Answer: C

 

Q45. An IP address of 192.168.1.1 belongs to which Class?

A) Class A

B) Class B

C) Class C

D) Class D

E) Class E

Answer: C (Class C range: 192-223).

 

Q46. A "Bridge" operates at which layer of the OSI model?

A) Physical

B) Data Link

C) Network

D) Transport

E) Session

Answer: B (Connects LAN segments).

 

Q47. Which protocol is connection-oriented and guarantees delivery?

A) UDP (User Datagram Protocol)

B) TCP (Transmission Control Protocol)

C) IP

D) ICMP

E) ARP

Answer: B (UDP is connectionless and does not guarantee delivery).

 

Q48. The speed of a Supercomputer network or Fiber Optic is typically measured in:

A) Kbps

B) Mbps

C) Gbps or Tbps (Gigabits/Terabits per second)

D) Hz

E) RPM

Answer: C

 

Q49. Which command displays the MAC address of your computer?

A) ipconfig /all (Windows)

B) ping

C) tracert

D) netstat

E) telnet

Answer: A (Or ifconfig in Linux/Mac).

 

Q50. A "Proxy Server" is used to:

A) Speed up the CPU.

B) Act as an intermediary for requests from clients seeking resources from other servers (providing anonymity or filtering).

C) Store files permanently.

D) Connect cables.

E) Generate IP addresses.

Answer: B

 

 

Q51. Which device is used to connect two LANs with the same protocol?

A) Router

B) Gateway

C) Bridge

D) Modem

E) Repeater

Answer: C

 

Q52. Which device is used to connect two networks with different protocols (e.g., AppleTalk to TCP/IP)?

A) Bridge

B) Switch

C) Gateway

D) Hub

E) Repeater

Answer: C (Gateway acts as a translator).

 

Q53. In a Star Topology, if the central Hub/Switch fails, what happens?

A) Only one computer stops working.

B) The entire network goes down.

C) Data travels to the next hub.

D) The network switches to Ring topology.

E) Nothing happens.

Answer: B

 

Q54. 10Base-T refers to:

A) 10 Mbps speed over Twisted Pair cable.

B) 10 GBps speed.

C) 10 Computers connected.

D) 10 Meter long cable.

E) 10 Base stations.

Answer: A

 

Q55. Which of the following is a private IP address range (Class C)?

A) 10.0.0.0 to 10.255.255.255

B) 172.16.0.0 to 172.31.255.255

C) 192.168.0.0 to 192.168.255.255

D) 8.8.8.8

E) 127.0.0.1

Answer: C

 

Q56. The Loopback IP address used for testing the network card (localhost) is:

A) 192.168.1.1

B) 127.0.0.1

C) 10.0.0.1

D) 255.255.255.0

E) 0.0.0.0

Answer: B

 

Q57. Which protocol resolves an IP address to a MAC address?

A) DNS

B) DHCP

C) ARP (Address Resolution Protocol)

D) RARP

E) ICMP

Answer: C

 

Q58. Which protocol resolves a MAC address to an IP address?

A) ARP

B) RARP (Reverse ARP)

C) DNS

D) HTTP

E) SMTP

Answer: B

 

Q59. The length of a MAC address is:

A) 32 bits

B) 48 bits (6 Bytes)

C) 64 bits

D) 128 bits

E) 16 bits

Answer: B

 

Q60. Which switching technique breaks data into small fixed-size units called "cells"?

A) Circuit Switching

B) Packet Switching

C) Message Switching

D) ATM (Asynchronous Transfer Mode)

E) Ethernet

Answer: D

 

Q61. In Fiber Optic cables, data is transmitted as:

A) Electrical pulses.

B) Radio waves.

C) Light pulses.

D) Sound waves.

E) Magnetic fields.

Answer: C

 

Q62. "Crosstalk" in networking refers to:

A) People talking over each other.

B) Interference caused by signals jumping from one wire to another.

C) A type of virus.

D) Connecting cables crosswise.

E) Encryption failure.

Answer: B

 

Q63. Which layer of the TCP/IP model corresponds to the OSI's Data Link and Physical layers combined?

A) Application Layer

B) Transport Layer

C) Internet Layer

D) Network Interface (or Network Access) Layer

E) Hardware Layer

Answer: D

 

Q64. What is the maximum length of a standard UTP cable segment (CAT5/CAT6) before signal loss occurs?

A) 10 meters

B) 50 meters

C) 100 meters

D) 500 meters

E) 1 kilometer

Answer: C

 

Q65. A "Packet" contains:

A) Only Data.

B) Only Source Address.

C) Only Destination Address.

D) Header (Source IP, Destination IP) + Payload (Data) + Trailer.

E) Only Error codes.

Answer: D

 

Q66. Which wireless standard is known as Wi-Fi?

A) IEEE 802.3

B) IEEE 802.5

C) IEEE 802.11

D) IEEE 802.15

E) IEEE 1394

Answer: C (802.3 is Ethernet).

 

Q67. "Bluetooth" standard is defined by:

A) IEEE 802.11

B) IEEE 802.15.1

C) IEEE 802.3

D) IEEE 802.16

E) IEEE 802.20

Answer: B

 

Q68. Which device is used to boost a signal in a wireless network?

A) Wireless Repeater / Range Extender

B) Switch

C) Modem

D) Firewall

E) Hub

Answer: A

 

Q69. The command "tracert" (Windows) or "traceroute" (Linux) is used to:

A) Check your own IP.

B) Show the path (hops) a packet takes to reach a destination.

C) Trace a hacker.

D) Find a file.

E) Measure internet speed.

Answer: B

 

Q70. Which protocol is used for secure web browsing (Encrypted HTTP)?

A) HTTP

B) HTTPS (Hyper Text Transfer Protocol Secure)

C) S-HTTP

D) SSH

E) SFTP

Answer: B (Uses SSL/TLS).

 

Q71. Port number 80 is reserved for:

A) FTP

B) SMTP

C) HTTP

D) HTTPS

E) Telnet

Answer: C

 

Q72. Port number 443 is reserved for:

A) HTTP

B) HTTPS

C) FTP

D) DNS

E) SSH

Answer: B

 

Q73. Port number 25 is reserved for:

A) SMTP (Email sending)

B) POP3

C) IMAP

D) FTP

E) Telnet

Answer: A

 

Q74. Which cable allows transmission speeds of 10 Gbps and higher over short distances in data centers?

A) Coaxial

B) Cat 3

C) Cat 6a / Cat 7 / Fiber

D) Telephone wire

E) USB cable

Answer: C

 

Q75. The "Domain Name System" (DNS) structure is:

A) Flat

B) Hierarchical (Root -> Top Level -> Second Level)

C) Linear

D) Circular

E) Random

Answer: B

 

Q76. Which of the following is a Top-Level Domain (TLD)?

A) www

B) google

C) .com

D) http://

E) index.html

Answer: C

 

Q77. What is "Phishing"?

A) Connecting to a network.

B) A cyber attack trying to trick you into revealing sensitive info (passwords) by pretending to be a trustworthy entity.

C) Installing software.

D) Cleaning a mouse.

E) A type of fishing game.

Answer: B

 

Q78. In which mode can data be transmitted in both directions simultaneously?

A) Simplex

B) Half-Duplex

C) Full-Duplex

D) Semi-Duplex

E) Complex

Answer: C

 

Q79. Which network device is essentially a multiport repeater?

A) Switch

B) Active Hub

C) Router

D) Gateway

E) Bridge

Answer: B

 

Q80. "Attenuation" refers to:

A) Strengthening of signal.

B) Loss of signal strength as it travels.

C) Speed of signal.

D) Delay of signal.

E) Encryption of signal.

Answer: B

 

Q81. The term "Node" in a network refers to:

A) The cable.

B) Any device (Computer, Printer) connected to the network.

C) The power supply.

D) The software.

E) The internet.

Answer: B

 

Q82. Which protocol is used to download files from a server?

A) SMTP

B) FTP

C) SNMP

D) UDP

E) ARP

Answer: B

 

Q83. A "MAC Address" is also known as:

A) Logical Address

B) Physical Address

C) Internet Address

D) Memory Address

E) Port Address

Answer: B

 

Q84. What does "ISDN" stand for?

A) Integrated Services Digital Network

B) Internal System Digital Network

C) International Standard Digital Network

D) Internet Service Data Network

E) Integrated System Data Node

Answer: A

 

Q85. Which transmission media is most affected by electromagnetic interference (EMI)?

A) Fiber Optic

B) Unshielded Twisted Pair (UTP)

C) Coaxial

D) Shielded Twisted Pair

E) Wireless

Answer: B (Unshielded copper acts like an antenna).

 

Q86. "Latency" is:

A) The speed of download.

B) The time delay for a data packet to travel from source to destination.

C) The width of the cable.

D) The cost of data.

E) The size of the packet.

Answer: B

 

Q87. Which protocol is stateless?

A) TCP

B) HTTP

C) FTP

D) SMTP

E) Telnet

Answer: B (The server forgets the client once the request is fulfilled, unless cookies are used).

 

Q88. MIME stands for:

A) Multipurpose Internet Mail Extensions

B) Multi Internet Mail Email

C) Multiple Interface Mail Extensions

D) Mail Internet Media Extension

E) Main Internet Mail Engine

Answer: A (Allows email to send non-text data like photos).

 

Q89. Which OSI layer handles "Dialog Control" and "Token Management"?

A) Session Layer

B) Transport Layer

C) Network Layer

D) Data Link Layer

E) Physical Layer

Answer: A

 

Q90. Which device reduces network traffic (Collision domains) by breaking a LAN into segments?

A) Hub

B) Switch (or Bridge)

C) Repeater

D) Modem

E) Cable

Answer: B (Switches create separate collision domains for each port).

 

Q91. What is the standard port for Telnet (Unsecure remote login)?

A) 21

B) 22

C) 23

D) 25

E) 80

Answer: C

 

Q92. What is the standard port for SSH (Secure Shell)?

A) 21

B) 22

C) 23

D) 80

E) 443

Answer: B

 

Q93. "Token Ring" is a standard defined by:

A) IEEE 802.3

B) IEEE 802.5

C) IEEE 802.11

D) IEEE 802.15

E) IEEE 802.1

Answer: B

 

Q94. A "Backbone" in a network is:

A) The main cable that connects different segments of a network together.

B) The power cord.

C) The server.

D) The user manual.

E) The firewall.

Answer: A

 

Q95. Which type of fiber optic cable allows multiple light paths and is used for shorter distances (LANs)?

A) Single Mode

B) Multi-Mode

C) Dual Mode

D) Quad Mode

E) Short Mode

Answer: B (Single mode is for long-distance WANs).

 

Q96. What is "Spoofing"?

A) Cleaning the cache.

B) A technique where an attacker disguises themselves as a trusted source (e.g., faking an IP address).

C) Speeding up the network.

D) Encrypting data.

E) Compressing files.

Answer: B

 

Q97. The process of converting Digital signals to Analog is called:

A) Modulation

B) Demodulation

C) Digitization

D) Encoding

E) Decoding

Answer: A (Demodulation is Analog to Digital).

 

Q98. "Bit Rate" refers to:

A) The cost of a bit.

B) The number of bits transmitted per second.

C) The error rate.

D) The voltage of a bit.

E) The storage size.

Answer: B

 

Q99. Which of the following is NOT a network topology?

A) Bus

B) Star

C) Ring

D) Circle (The correct term is Ring)

E) Car (Not a topology)

Answer: E (Trick question - "Ring" is the formal term, "Circle" is usually accepted loosely, but "Car" is definitely wrong).

 

Q100. "VPN" stands for:

A) Virtual Public Network

B) Visual Private Network

C) Virtual Private Network

D) Virtual Personal Network

E) Visual Public Node

Answer: C