0% found this document useful (0 votes)
3 views

Networking MCQS

The document consists of a series of multiple-choice questions related to computer networks, internet concepts, network layers, and protocols. It covers topics such as types of networks, network devices, data transmission methods, and network topologies. The questions aim to assess knowledge on fundamental networking principles and technologies.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Networking MCQS

The document consists of a series of multiple-choice questions related to computer networks, internet concepts, network layers, and protocols. It covers topics such as types of networks, network devices, data transmission methods, and network topologies. The questions aim to assess knowledge on fundamental networking principles and technologies.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

1. What is a computer network?

a) A device used to display information on a computer screen


b) A collection of interconnected computers and devices that can communicate and
share resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components

2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network

3. Which of the following is an example of Bluetooth?


a) wide area network
b) virtual private network
c) local area network
d) personal area network

4. Which of the following computer networks is built on the top of another


network?
a) overlay network
b) prime network
c) prior network
d) chief network
5. What is the full form of OSI?
a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface

6. When a collection of various computers appears as a single coherent system to


its clients, what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system

7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6

8. What are nodes in a computer network?


a) the computer that routes the data
b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned
9. Which one of the following is not a function of network layer?
a) congestion control
b) error control
c) routing
d) inter-networking

10. How is a single channel shared by multiple signals in a computer network?


a) multiplexing
b) phase modulation
c) analog modulation
d) digital modulation

11. Which of the following devices forwards packets between networks by


processing the routing information included in the packet?
a) firewall
b) bridge
c) hub
d) router

12. What is the term for an endpoint of an inter-process communication flow


across a computer network?
a) port
b) machine
c) socket
d) pipe
13. How do two devices become part of a network?
a) PIDs of the processes running of different devices are same
b) a process in one device is able to exchange information with a process in
another device
c) a process is active and another is inactive
d) a process is running on both devices

14. Which layer does the data link layer take packets from and encapsulate them
into frames for transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer

15. Which of this is not a network edge device?


a) Switch
b) PC
c) Smartphones
d) Servers

16. Which type of network shares the communication channel among all the
machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network
17. Which topology requires a multipoint connection?
a) Ring
b) Bus
c) Star
d) Mesh

18. Which of the following maintains the Domain Name System?


a) a single server
b) a single computer
c) distributed database system
d) none of the mentioned

19. When discussing IDS/IPS, what is a signature?


a) It refers to “normal,” baseline network behavior
b) It is used to authorize the users on a network
c) An electronic signature used to authenticate the identity of a user on the network
d) Attack-definition file

20. Which of the following are Gigabit Ethernets?


a) 1000 BASE-LX
b) 1000 BASE-CX
c) 1000 BASE-SX
d) All of the mentioned
21. Which of the following networks extends a private network across public
networks?
a) virtual private network
b) local area network
c) storage area network
d) enterprise private network

22. Which layer is responsible for process to process delivery in a general network
model?
a) session layer
b) data link layer
c) transport layer
d) network layer

23. What does each packet contain in a virtual circuit network?


a) only source address
b) only destination address
c) full source and destination address
d) a short VC number

24. What is the term for the data communication system within a building or
campus?
a) MAN
b) LAN
c) PAN
d) WAN
25. What was the name of the first network?
a) ASAPNET
b) ARPANET
c) CNNET
d) NSFNET

26. Which of the following is the network layer protocol for the internet?
a) hypertext transfer protocol
b) file transfer protocol
c) ethernet
d) internet protocol

27. Which network topology requires a central controller or hub?


a) Ring
b) Bus
c) Star
d) Mesh

28. If a link transmits 4000 frames per second, and each slot has 8 bits, what is the
transmission rate of the circuit using Time Division Multiplexing (TDM)?
a) 500kbps
b) 32kbps
c) 32bps
d) 500bps
29. Which of the following allows LAN users to share computer programs and
data?
a) File server
b) Network
c) Communication server
d) Print server

30. What type of transmission is involved in communication between a computer


and a keyboard?
a) Half-duplex
b) Full-duplex
c) Simplex
d) Automatic

31. Which layer provides the services to user?


a) physical layer
b) presentation layer
c) session layer
d) application layer

32. Which connection is necessary for a computer to join the internet?


a) internet society
b) internet service provider
c) different computer
d) internet architecture board
33. Which of the following allows you to connect and login to a remote computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet

34. Which of the following is used in an attempt to render a computer resource


unavailable to its intended users?
a) botnet process
b) worms attack
c) virus attack
d) denial-of-service attack

You might also like