Try to answer these 400+ Computer Networking MCQs and check your understanding of the Computer Networking subject.
Scroll down and let's begin!
A. ipconfig
B. ping
C. itconfig
D. ipconfig /all
A. 82.77.0.0
B. 82.0.0.0
C. 82.77.201.255
D. 82.77.201.0
A. Depends on the physical constructs of the environment, e.g., walls.
B. 1000 feet
C. 30 feet
D. 200 feet
A. Tracing the route that a IP packet is taking
B. Determining if a TCP connection can be established
C. Are ICMP ports opened on the remote end?
D. Does connectivity exist between two IP end points
A. Packets
B. TPDU
C. Frames
D. Bits
A. 127.256.0.1
B. 192.168.1.1
C. 0.0.0.0
D. 127.0.0.1
A. 6
B. 7
C. Its not a layered architecture.
D. 5
A. MySpecialPa$$w0rd
B. Xyz
C. mysecretpassword
D. Keep this place private
E. password12345
A. 80
B. 90
C. 65
D. 21
A. 7
B. 10
C. 8
D. 3
A. Network Interface Card
B. New Internet Card
C. Net Interface card
D. National Integration Circuit
A. No, this is one of the limitations of current operating systems.
B. No, this is one of the limitations of current networking technologies.
C. Yes, but special software is required.
D. Yes, network communication is operating system independent. What is important is if the computers are using the same protocol.
A. Yes, using a cross-over cable.
B. No, networking was not meant to work that way.
C. No, not withough special equipment that is very expensive.
A. RJ-45
B. RJ-69
C. RJ-11
D. RJ-15
E. RJ-47
A. MAN
B. LAN
C. PAN
D. WAN
A. HTTP
B. IP
C. PP
D. TCP
A. The physical size of a networking cable.
B. The size of a rock band.
C. Transmission rate.
A. RTP
B. TCP
C. UDP
D. TFTP
A. Ring
B. Bus
C. Star
D. Access
A. system to prevent unauthorized access.
B. Physical boundary of network
C. simple web browsing software.
D. None of these
A. Connectionless
B. Connection Oriented
C. Unreliable
D. Best Effort
A. The network address for a computer running Mac OSX.
B. Another name for an IP address.
C. A number associated with an IP address to direct network communication to a specific application.
D. A unique hardware identification number for a network card.
A. WinIP
B. Ipadapter/all
C. Ipconfig
D. Configip
E. Winip/all
A. Web browser/server
B. email client/server
C. Peer-to-Peer between hosts.
A. IP
B. IMAP
C. DHCP
D. FTP
A. Asymmetric dual smart line
B. Asymmetric digital subscriber line
C. None of these
D. Asymmetric double system line
A. Yes, but it must be done via a wireless network between the local networks.
B. Yes only if an entry-point (such as a router) for each local network is provided.
C. No, not withough special equipment that is very expensive.
D. No
A. The closing of communication between two hosts.
B. The intial set-up between two communicating hosts.
C. A gesture of frustration from a network administrator.
A. PPP
B. WPA
C. VPN
D. IPSec
E. MAC
A. eBGP
B. NAT (Network Address Translation)
C. CIDR Network address
D. Route Summarization
A. 56k
B. 10-base
C. Gigabit
D. Megabit
A. If the wireless device supports wireless B and the wireless router only supports wireless G.
B. If the wireless device has a MAC address blocked by the wireless router.
C. If the wireless device does not support the security encryption of the wireless router.
D. All of these.
A. 150 m / 492 ft
B. 50m / 164 ft
C. 100m / 328 ft
D. 200 m / 656 ft
A. TCP
B. UDP
A. None of these
B. To ensure stability on the entire network.
C. To gaurantee the IP of the computer/server will not change.
D. To limit the transmision rate of a computer/server.
A. TCP
B. IMAP
C. POP
D. SMTP
A. IP address
B. MAC address
C. Mrbig@proprofs.com
D. Workstation name
E. www.proprofs.com
A. Wide area Network
B. Personal Area Network
C. Internet
D. Local Area Network
A. Yes
B. No
A. Service
B. Protocols
C. Interface
D. Information access
A. Connector
B. Straight through
C. Cross-over
A. 8080
B. 80
C. 21
A. Transport Layer
B. Application Layer
C. Network Layer
D. Session Layer
A. To limit the number of user errors on a network, hence Idiot Proof.
B. To identify an application running on a network.
C. To uniquely identify a host computer on a network.
D. To provide a host computer on the network an identity.
A. 200 m (656 feet)
B. 100 m (328 feet)
C. 60 m (197 feet)
D. 120 m (394 feet)
E. 50 m (164 feet)
A. No
B. Yes
A. One byte at a time.
B. All the data is transfered at once.
C. Through clusters of bits called bytes.
D. Through chunks called packets.
A. None of these
B. Communication
C. Switching
D. Routing
A. Class B with a mask 255.255.0.0 or /16
B. Class A with a mask 255.0.0.0 or /8
C. Class D with a mask 255.255.255.255 or /32
D. Class C with a mask 255.255.255.0 or /24
A. Server
B. Router
C. Fibre
D. Hub/Switch
A. True
B. False
A. Network address resolve the address of hardware device and port number search and identify software application.
B. Network address resolve the address of software application and port number search and identify hardware device.
A. UDP
B. TCP
C. IP
D. SMTP
E. CAD
A. Hosts
B. Routers
C. Server
D. Applications
A. When one host requests information from another host.
B. A client host requests a service from an always-on server.
C. The relationship between a patron of a business and a employee of that business.
A. None of these
B. Queue
C. Spool
D. Node
A. A protocol is a standard for communications over wireless networks.
B. A protocol dictates how a computer joins a network.
C. A protocol defines the order and format of messages within a network.
A. 2^16
B. 2^64
C. 2^32
D. 2^128
A. 1476
B. 1384
C. 1458
D. 1500
A. Unicast
B. Multicast
C. Anycast
D. Broadcast
A. Circuit Switching
B. Packet Switching
C. None of them
A. Session
B. Network
C. Transport
D. Physical
E. Data Link
A. 192.168.0.5
B. 8.8.8.8
C. 25.740.265.70
D. 169.254.0.8
E. 10.10.0.5
A. IP
B. TCP
C. UDP
D. DHCP
A. Switch operate using a broadcast model and Hub operate using a virtual circuit model
B. None of Them
C. Hub operate using a broadcast model and switches operate using a virtual circuit model
A. User-Server state
B. Web Caching(Proxy Server)
C. Cookies
D. Client server state
A. Firefox
B. FTP
C. Ping
D. Telnet
A. Static IP address and configured as part of a domain.
B. There is no default settings for a Windows XP network adapter card.
C. Static IP address and configured as part of aworkgroup.
D. DHCP and configured as a part of a domain.
E. DHCP and configured as part of a workgroup.
A. Delivery of data is guaranteed in TCP whereas it cannot be guaranteed in UDP
B. Sequencing of data is a feature of TCP whereas there is no sequencing of data in UDP
C. TCP is a connection oriented protocol whereas UDP is datagram oriented protocol
D. All of them are correct
E. Re-transmission of lost packets is possible in TCP whereas in UDP, it is not possible
A. Application layer
B. Session layer
C. Data Link layer
D. Physical layer
A. The Type of Service
B. The Time to Live (TTL)
C. The Header Checksum
D. The Protocol Number
A. DHCP
B. UDP
C. TCP
D. IP
A. Divide the host HDD into memory locations.
B. Trace the path to the local area network gateway.
C. Create a shortcut to a network location.
D. Send instructions to a user to access the remote local area network.
E. A schematic drawing of all network adapter locations on the network system.
A. 191.77.56.1
B. 0.0.0.1
C. 192.35.111.1
D. 128.30.33.1
A. Sockets
B. Client
C. Server
D. Router
A. application developers can change only one layer's protocols at a time.
B. To create a layered model larger than the DoD model.
C. different networks could communicate.
D. Cisco could use the model.
A. True
B. False
A. None of these
B. Full Duplex
C. Simple
D. Half Duplex
A. peer-to-peer model (Hybrid)
B. None of the above
C. End systems(hosts)
D. Client/Server model
A. 192.168.0.1
B. 255.255.255.0
C. 255.255.255.248
D. 255.255.255.29
E. 192.168.0.255
A. Ring
B. Tree
C. Bus
D. Mesh
A. Transport layer
B. Application layer
C. Physical layer
D. Network layer
A. G
B. B
C. C
D. A
A. Sometimes
B. No
C. Yes
A. 5
B. 24
C. 11
D. 10
A. Proxy IP
B. Proxy ARP
C. Gratutious ARP
D. Inverse ARP
A. Unit
B. Frames
C. Packets
D. TPDU
A. Mesh
B. Star
C. None
D. Bus
A. The computer is configured for DHCP and cannot connect to the DHCP server
B. The computer is configured with a static IP address.
C. The computer is being used as an Internet shared connection host.
D. The computer has been configurd to work with a Linux system.
E. The computer is using a dial-up modem.
A. 2^16
B. None of these
C. 2^32
D. 2^64
A. The businesses of the respective country.
B. The local government's network administration.
C. Top-level domain (TLD) servers.
D. Country-wide domain (CWD) servers.
A. 11Mbps
B. 54Mbps
C. 300Mbps
D. 150Mbps
A. Star
B. BUS
C. Ring
D. None of these
A. TCP
B. BootP
C. ICMP
D. ARP
A. Jitter
B. Delayed packet
C. None of these
D. Delayed buffer
A. Unix and Mac OSX
B. Windows
C. Unix
D. Mac OSX
A. No because DNS is a luxury that only large businesses can afford.
B. Yes, since no one could ever visit your website without a DNS.
C. No, but that means there will be no translation from hostname to IP address.
A. UDP
B. IP
C. TCP
D. ARP
A. Clear the ARP Cache on the router
B. Update NAT
C. Start the Web Service application
D. Add a firewall rule
A. Resolves a MAC address to a DNS name
B. Resolves a MAC address to an IP address
C. Resolves an IP address to a MAC address
D. Resolves a DNS name to a MAC address