Computer Networking MCQs

Computer Networking MCQs

Try to answer these 400+ Computer Networking MCQs and check your understanding of the Computer Networking subject.
Scroll down and let's begin!

1: In the Command Prompt, what is the command to show the most detailed printout of IP address info?

A.   ipconfig

B.   ping

C.   itconfig

D.   ipconfig /all

2: Given the IP address 82.77.201.1/24, what is the network number?

A.   82.77.0.0

B.   82.0.0.0

C.   82.77.201.255

D.   82.77.201.0

3: What is the normal reach of a signal from a wireless router?

A.   Depends on the physical constructs of the environment, e.g., walls.

B.   1000 feet

C.   30 feet

D.   200 feet

4: When using the PING utility, what are you trying to accomplish?

A.   Tracing the route that a IP packet is taking

B.   Determining if a TCP connection can be established

C.   Are ICMP ports opened on the remote end?

D.   Does connectivity exist between two IP end points

5: The name of unit exchanged at network layer is called:

A.   Packets

B.   TPDU

C.   Frames

D.   Bits

6: Which IP address is reserved for loopback testing and debugging?

A.   127.256.0.1

B.   192.168.1.1

C.   0.0.0.0

D.   127.0.0.1

7: Open System Interconnection (OSI) Model has following layers:

A.   6

B.   7

C.   Its not a layered architecture.

D.   5

8: Which is the best example of a secure password?

A.   MySpecialPa$$w0rd

B.   Xyz

C.   mysecretpassword

D.   Keep this place private

E.   password12345

9: Port number of HTTP is:

A.   80

B.   90

C.   65

D.   21

10: How many layers are there in the OSI model?

A.   7

B.   10

C.   8

D.   3

11: What is NIC?

A.   Network Interface Card

B.   New Internet Card

C.   Net Interface card

D.   National Integration Circuit

12: Can computers with different operating systems communicate over a network?

A.   No, this is one of the limitations of current operating systems.

B.   No, this is one of the limitations of current networking technologies.

C.   Yes, but special software is required.

D.   Yes, network communication is operating system independent. What is important is if the computers are using the same protocol.

13: Is it possible to connect two computers without using any hubs or routers for network communication?

A.   Yes, using a cross-over cable.

B.   No, networking was not meant to work that way.

C.   No, not withough special equipment that is very expensive.

14: Which of the following is an Ethernet connector type?

A.   RJ-45

B.   RJ-69

C.   RJ-11

D.   RJ-15

E.   RJ-47

15: What type of network is commonly used in houses?

A.   MAN

B.   LAN

C.   PAN

D.   WAN

16: Which of the following is NOT a protocol?

A.   HTTP

B.   IP

C.   PP

D.   TCP

17: What is bandwidth?

A.   The physical size of a networking cable.

B.   The size of a rock band.

C.   Transmission rate.

18: Which of the following is a connection oriented protocol?

A.   RTP

B.   TCP

C.   UDP

D.   TFTP

19: Which of the following is not a network topology?

A.   Ring

B.   Bus

C.   Star

D.   Access

20: A firewall in a Computer Network is a

A.   system to prevent unauthorized access.

B.   Physical boundary of network

C.   simple web browsing software.

D.   None of these

21: TCP is a ___ protocol.

A.   Connectionless

B.   Connection Oriented

C.   Unreliable

D.   Best Effort

22: What is a MAC address?

A.   The network address for a computer running Mac OSX.

B.   Another name for an IP address.

C.   A number associated with an IP address to direct network communication to a specific application.

D.   A unique hardware identification number for a network card.

23: Which command will display the assigned IP address of a network adpater installed on a Windows XP system?

A.   WinIP

B.   Ipadapter/all

C.   Ipconfig

D.   Configip

E.   Winip/all

24: Which of the following is NOT an example of a client/server?

A.   Web browser/server

B.   email client/server

C.   Peer-to-Peer between hosts.

25: Which protocol is used for email transmission?

A.   IP

B.   IMAP

C.   DHCP

D.   FTP

26: ADSL stands for:

A.   Asymmetric dual smart line

B.   Asymmetric digital subscriber line

C.   None of these

D.   Asymmetric double system line

27: Is it possible for a computer on local network A to talk to a computer on a local network B?

A.   Yes, but it must be done via a wireless network between the local networks.

B.   Yes only if an entry-point (such as a router) for each local network is provided.

C.   No, not withough special equipment that is very expensive.

D.   No

28: What is a handshake?

A.   The closing of communication between two hosts.

B.   The intial set-up between two communicating hosts.

C.   A gesture of frustration from a network administrator.

29: Which is example of wireless encryption?

A.   PPP

B.   WPA

C.   VPN

D.   IPSec

E.   MAC

30: What technology exists that allows a non-routable IP address to communicate with the global IP Internet Network.

A.   eBGP

B.   NAT (Network Address Translation)

C.   CIDR Network address

D.   Route Summarization

31: What is currently the most common and fastest transmission rate for ethernet cables?

A.   56k

B.   10-base

C.   Gigabit

D.   Megabit

32: When can a wireless device NOT connect to a wireless network?

A.   If the wireless device supports wireless B and the wireless router only supports wireless G.

B.   If the wireless device has a MAC address blocked by the wireless router.

C.   If the wireless device does not support the security encryption of the wireless router.

D.   All of these.

33: What is the maximum supported distance for an Ethernet cable run?

A.   150 m / 492 ft

B.   50m / 164 ft

C.   100m / 328 ft

D.   200 m / 656 ft

34: Which one is connectionless protocol?

A.   TCP

B.   UDP

35: What is the purpose of a static IP?

A.   None of these

B.   To ensure stability on the entire network.

C.   To gaurantee the IP of the computer/server will not change.

D.   To limit the transmision rate of a computer/server.

36: Which of the following is NOT an application layer protocol for email?

A.   TCP

B.   IMAP

C.   POP

D.   SMTP

37: Which item is an example of a physical network address?

A.   IP address

B.   MAC address

C.   Mrbig@proprofs.com

D.   Workstation name

E.   www.proprofs.com

38: Which of the network type covers the country level location:

A.   Wide area Network

B.   Personal Area Network

C.   Internet

D.   Local Area Network

39: Can a computer also act as a router?

A.   Yes

B.   No

40: Which of the following describes how two communicating parties exchange information?

A.   Service

B.   Protocols

C.   Interface

D.   Information access

41: When you connect two network switches or two computers directly what type of Ethernet cable do you need?

A.   Connector

B.   Straight through

C.   Cross-over

42: FTP client contacts FTP server at port:

A.   8080

B.   80

C.   21

43: A user loads a web browser and browses to http://www.google.com, what is the highest layer of the OSI model the user is functioning at?

A.   Transport Layer

B.   Application Layer

C.   Network Layer

D.   Session Layer

44: What is the purpose of an IP?

A.   To limit the number of user errors on a network, hence Idiot Proof.

B.   To identify an application running on a network.

C.   To uniquely identify a host computer on a network.

D.   To provide a host computer on the network an identity.

45: What is the maximum Ethernet cable length between repeaters (computers or switches)?

A.   200 m (656 feet)

B.   100 m (328 feet)

C.   60 m (197 feet)

D.   120 m (394 feet)

E.   50 m (164 feet)

46: Is it possible to program at the socket level?

A.   No

B.   Yes

47: How is data transferred over a network?

A.   One byte at a time.

B.   All the data is transfered at once.

C.   Through clusters of bits called bytes.

D.   Through chunks called packets.

48: The process in which information packets are forwarded to hops is called:

A.   None of these

B.   Communication

C.   Switching

D.   Routing

49: Which of the following major networks contain an incorrect subnet mask?

A.   Class B with a mask 255.255.0.0 or /16

B.   Class A with a mask 255.0.0.0 or /8

C.   Class D with a mask 255.255.255.255 or /32

D.   Class C with a mask 255.255.255.0 or /24

50: Which device is the central device of star topology?

A.   Server

B.   Router

C.   Fibre

D.   Hub/Switch