Q1. Which layer of the OSI model creates, maintains, and terminates the session between the source and destination devices?

A) Transport Layer

B) Session Layer

C) Application Layer

D) Network Layer

E) Data Link Layer

Answer: B

 

Q2. Which network device operates at all 7 layers of the OSI model and serves as an entry/exit point between dissimilar networks (translating protocols)?

A) Switch

B) Hub

C) Gateway

D) Router

E) Bridge

Answer: C

 

Q3. In IPv4, the loopback address used for testing the network card (localhost) is:

A) 192.168.1.1

B) 127.0.0.1

C) 0.0.0.0

D) 255.255.255.0

E) 10.0.0.1

Answer: B

 

Q4. What is the length of an IPv6 address?

A) 32 bits

B) 48 bits

C) 64 bits

D) 128 bits

E) 256 bits

Answer: D

 

Q5. Which protocol is responsible for resolving an IP address to a MAC address?

A) DNS

B) DHCP

C) ARP (Address Resolution Protocol)

D) RARP

E) ICMP

Answer: C

 

Q6. Which protocol is Connectionless and does NOT guarantee delivery of data (Best Effort)?

A) TCP

B) UDP (User Datagram Protocol)

C) FTP

D) SMTP

E) HTTP

Answer: B

 

Q7. "Ping" command uses which protocol to check connectivity?

A) TCP

B) UDP

C) ICMP (Internet Control Message Protocol)

D) ARP

E) IP

Answer: C

 

Q8. Which topology is most robust/reliable because every node is connected to every other node?

A) Star

B) Bus

C) Mesh

D) Ring

E) Tree

Answer: C

 

Q9. The "Three-Way Handshake" (SYN, SYN-ACK, ACK) is associated with:

A) UDP Connection

B) TCP Connection establishment

C) DNS Lookup

D) DHCP Discovery

E) Email Sending

Answer: B

 

Q10. Which command is used to display the "Hop-by-Hop" path a packet takes to a destination?

A) ping

B) ipconfig

C) tracert (Windows) / traceroute (Linux)

D) netstat

E) nslookup

Answer: C

 

Q11. "MAC Address" is a:

A) 32-bit Logical Address.

B) 48-bit Physical Address (burned into the NIC).

C) 64-bit Address.

D) Software Address.

E) URL.

Answer: B

 

Q12. Which device breaks a large network into smaller segments to reduce collision domains (operating at Layer 2)?

A) Hub

B) Switch

C) Repeater

D) Amplifier

E) Passive Hub

Answer: B

 

Q13. In a Class C IP Address, the default Subnet Mask is:

A) 255.0.0.0

B) 255.255.0.0

C) 255.255.255.0

D) 255.255.255.255

E) 0.0.0.0

Answer: C

 

Q14. "Port 80" is reserved for:

A) HTTPS

B) FTP

C) HTTP

D) Telnet

E) SMTP

Answer: C (HTTPS is 443).

 

Q15. "Port 443" is reserved for:

A) HTTP

B) HTTPS

C) SSH

D) DNS

E) FTP

Answer: B

 

Q16. Which of the following is a Private IP Address (not routable on the public internet)?

A) 8.8.8.8

B) 172.16.50.1

C) 1.1.1.1

D) 202.54.10.1

E) 50.100.10.1

Answer: B (Class B Private Range: 172.16.x.x - 172.31.x.x).

 

Q17. "CSMA/CD" is the access method used in:

A) Wireless LAN

B) Ethernet (Wired LAN)

C) Bluetooth

D) Token Ring

E) FDDI

Answer: B

 

Q18. "CSMA/CA" (Collision Avoidance) is used in:

A) Ethernet

B) Wi-Fi (Wireless LAN - 802.11)

C) Token Ring

D) Fiber Optics

E) Mainframes

Answer: B

 

Q19. Which wireless standard corresponds to Wi-Fi 6?

A) 802.11n

B) 802.11ac

C) 802.11ax

D) 802.15

E) 802.3

Answer: C

 

Q20. "Bluetooth" is defined by IEEE standard:

A) 802.11

B) 802.15.1

C) 802.3

D) 802.5

E) 802.16

Answer: B

 

Q21. A "Firewall" can operate at which layer(s)?

A) Network Layer (Packet Filtering)

B) Application Layer (Proxy)

C) Transport Layer

D) All of the above

E) Physical Layer only

Answer: D (Modern firewalls work across multiple layers).

 

Q22. "VPN" stands for:

A) Virtual Public Network

B) Virtual Private Network

C) Visual Private Network

D) Virtual Personal Network

E) Verified Private Network

Answer: B

 

Q23. Which protocol automates the assignment of IP addresses to devices on a network?

A) DNS

B) DHCP

C) ARP

D) SMTP

E) SNMP

Answer: B

 

Q24. "DNS" translates:

A) MAC to IP.

B) Domain Names (e.g., www.google.com) to IP Addresses.

C) IP to MAC.

D) English to Binary.

E) Files to Folders.

Answer: B

 

Q25. "Attenuation" refers to:

A) The strengthening of a signal.

B) The loss of signal strength as it travels through a medium.

C) The speed of the signal.

D) The noise in the signal.

E) The encryption of the signal.

Answer: B

 

Q26. Which cable is immune to Electromagnetic Interference (EMI) and uses light to transmit data?

A) Coaxial

B) UTP (Unshielded Twisted Pair)

C) Fiber Optic

D) STP

E) Telephone wire

Answer: C

 

Q27. The PDU (Protocol Data Unit) at the Network Layer is called a:

A) Frame

B) Packet

C) Segment

D) Bit

E) Message

Answer: B

 

Q28. The PDU at the Transport Layer is called a:

A) Frame

B) Packet

C) Segment (for TCP) or Datagram (for UDP)

D) Bit

E) Stream

Answer: C

 

Q29. The PDU at the Data Link Layer is called a:

A) Frame

B) Packet

C) Segment

D) Bit

E) Pixel

Answer: A

 

Q30. "Full Duplex" transmission means:

A) Data travels in one direction only.

B) Data travels in both directions, but one at a time.

C) Data travels in both directions simultaneously.

D) Data is broadcast.

E) Data is encrypted.

Answer: C (e.g., Telephone).

 

Q31. Which networking device works at Layer 1 (Physical Layer) and simply broadcasts data to all ports?

A) Switch

B) Hub

C) Router

D) Bridge

E) Gateway

Answer: B

 

Q32. "WiMAX" (Worldwide Interoperability for Microwave Access) is defined by:

A) IEEE 802.11

B) IEEE 802.16

C) IEEE 802.3

D) IEEE 802.15

E) IEEE 802.20

Answer: B

 

Q33. Which command shows active TCP connections and ports?

A) ping

B) netstat

C) tracert

D) ipconfig

E) nslookup

Answer: B

 

Q34. "Subnet Mask" is used to:

A) Hide the IP.

B) Identify which part of the IP address is the Network ID and which is the Host ID.

C) Encrypt data.

D) Speed up the network.

E) Create passwords.

Answer: B

 

Q35. "SSH" (Secure Shell) typically uses Port:

A) 21

B) 22

C) 23

D) 25

E) 80

Answer: B

 

Q36. "Telnet" (Unsecure remote login) uses Port:

A) 21

B) 22

C) 23

D) 80

E) 443

Answer: C

 

Q37. "SMTP" uses Port:

A) 25

B) 110

C) 143

D) 80

E) 21

Answer: A

 

Q38. "Multiplexing" is:

A) Sending multiple signals over a single channel simultaneously.

B) Connecting multiple cables.

C) Copying data.

D) Compressing files.

E) Encrypting data.

Answer: A

 

Q39. "Packet Switching" breaks data into:

A) Electrical pulses.

B) Small packets that can take different paths to the destination.

C) Large files.

D) Sound waves.

E) Binary code.

Answer: B

 

Q40. "Circuit Switching" (used in old telephone networks) establishes:

A) A dedicated physical path between sender and receiver for the duration of the call.

B) Virtual paths.

C) No path.

D) Multiple paths.

E) Wireless path.

Answer: A

 

Q41. A "Proxy Server" acts as:

A) A virus.

B) An intermediary for requests from clients seeking resources from other servers (providing anonymity/caching).

C) A fast modem.

D) A DNS server.

E) A file server.

Answer: B

 

Q42. "Modem" stands for:

A) Modulation Demodulation

B) Modulator Demodulator

C) Modern Demodulator

D) Mobile Demodulator

E) Main Demodulator

Answer: B

 

Q43. Which protocol is used to retrieve email from a server?

A) SMTP

B) POP3 or IMAP

C) FTP

D) SNMP

E) HTTP

Answer: B

 

Q44. The "Star Topology" uses a central device called:

A) Terminator

B) Hub or Switch

C) Repeater

D) Token

E) Backbone

Answer: B

 

Q45. "Token Ring" topology uses which standard?

A) IEEE 802.3

B) IEEE 802.5

C) IEEE 802.11

D) IEEE 802.15

E) IEEE 802.1

Answer: B

 

Q46. "Ethernet" uses which standard?

A) IEEE 802.3

B) IEEE 802.5

C) IEEE 802.11

D) IEEE 802.15

E) IEEE 802.16

Answer: A

 

Q47. A "Broadcast Address" is an address that:

A) Sends data to a specific host.

B) Sends data to all hosts on the network segment.

C) Sends data to the router only.

D) Sends data to the internet.

E) Is invalid.

Answer: B (e.g., 255.255.255.255).

 

Q48. "Unicast" means:

A) One-to-One communication.

B) One-to-All.

C) One-to-Many (Group).

D) Many-to-Many.

E) None.

Answer: A

 

Q49. "Multicast" means:

A) One-to-One.

B) One-to-Specific Group of hosts.

C) One-to-All.

D) Broadcast.

E) Anycast.

Answer: B

 

Q50. "Latency" is best defined as:

A) Bandwidth.

B) The time delay for a packet to travel from source to destination.

C) Throughput.

D) Error rate.

E) Speed of light.

Answer: B

 

Q51. Which device operates at the Network Layer (Layer 3)?

A) Switch

B) Router

C) Hub

D) Repeater

E) Bridge

Answer: B

 

Q52. "Jitter" in networking refers to:

A) High speed.

B) Variation in packet delay (Latency).

C) Packet loss.

D) Signal strength.

E) Connection drop.

Answer: B

 

Q53. "Cross-over Cable" is used to connect:

A) PC to Switch.

B) PC to PC (Similiar devices).

C) Switch to Router.

D) PC to Hub.

E) Modem to Router.

Answer: B

 

Q54. "Straight-through Cable" is used to connect:

A) PC to Switch (Dissimilar devices).

B) Switch to Switch.

C) PC to PC.

D) Router to Router.

E) Hub to Hub.

Answer: A

 

Q55. The maximum length of a CAT6 cable segment is:

A) 100 meters

B) 500 meters

C) 10 meters

D) 1 km

E) 50 meters

Answer: A

 

Q56. "Anycast" is a routing method where:

A) Data is sent to the nearest or best destination node in a group.

B) Data is sent to everyone.

C) Data is sent to one specific node.

D) Data is lost.

E) Data is encrypted.

Answer: A (Used by CDNs).

 

Q57. "Baud Rate" refers to:

A) Bits per second.

B) The number of signal changes per second.

C) Bytes per second.

D) Error rate.

E) Packet rate.

Answer: B (Not always equal to Bit Rate).

 

Q58. "NFC" (Near Field Communication) works at a range of:

A) 10 meters

B) 100 meters

C) 4 cm (Very short range).

D) 1 km

E) 50 meters

Answer: C

 

Q59. "Li-Fi" uses:

A) Radio waves.

B) Visible Light Communication (VLC).

C) Sound.

D) Wires.

E) Microwave.

Answer: B

 

Q60. Which command clears the DNS cache in Windows?

A) ipconfig /flushdns

B) ipconfig /release

C) netstat -c

D) ping -t

E) tracert

Answer: A