Try to answer these 400+ Computer Networking MCQs and check your understanding of the Computer Networking subject.
Scroll down and let's begin!
A. ipconfig
B. ping
C. itconfig
D. ipconfig /all
A. 82.77.0.0
B. 82.0.0.0
C. 82.77.201.255
D. 82.77.201.0
A. Depends on the physical constructs of the environment, e.g., walls.
B. 1000 feet
C. 30 feet
D. 200 feet
A. Tracing the route that a IP packet is taking
B. Determining if a TCP connection can be established
C. Are ICMP ports opened on the remote end?
D. Does connectivity exist between two IP end points
A. Packets
B. TPDU
C. Frames
D. Bits
A. 127.256.0.1
B. 192.168.1.1
C. 0.0.0.0
D. 127.0.0.1
A. 6
B. 7
C. Its not a layered architecture.
D. 5
A. MySpecialPa$$w0rd
B. Xyz
C. mysecretpassword
D. Keep this place private
E. password12345
A. 80
B. 90
C. 65
D. 21
A. 7
B. 10
C. 8
D. 3
A. Network Interface Card
B. New Internet Card
C. Net Interface card
D. National Integration Circuit
A. No, this is one of the limitations of current operating systems.
B. No, this is one of the limitations of current networking technologies.
C. Yes, but special software is required.
D. Yes, network communication is operating system independent. What is important is if the computers are using the same protocol.
A. Yes, using a cross-over cable.
B. No, networking was not meant to work that way.
C. No, not withough special equipment that is very expensive.
A. RJ-45
B. RJ-69
C. RJ-11
D. RJ-15
E. RJ-47
A. MAN
B. LAN
C. PAN
D. WAN
A. HTTP
B. IP
C. PP
D. TCP
A. The physical size of a networking cable.
B. The size of a rock band.
C. Transmission rate.
A. RTP
B. TCP
C. UDP
D. TFTP
A. Ring
B. Bus
C. Star
D. Access
A. system to prevent unauthorized access.
B. Physical boundary of network
C. simple web browsing software.
D. None of these
A. Connectionless
B. Connection Oriented
C. Unreliable
D. Best Effort
A. The network address for a computer running Mac OSX.
B. Another name for an IP address.
C. A number associated with an IP address to direct network communication to a specific application.
D. A unique hardware identification number for a network card.
A. WinIP
B. Ipadapter/all
C. Ipconfig
D. Configip
E. Winip/all
A. Web browser/server
B. email client/server
C. Peer-to-Peer between hosts.
A. IP
B. IMAP
C. DHCP
D. FTP
A. Asymmetric dual smart line
B. Asymmetric digital subscriber line
C. None of these
D. Asymmetric double system line
A. Yes, but it must be done via a wireless network between the local networks.
B. Yes only if an entry-point (such as a router) for each local network is provided.
C. No, not withough special equipment that is very expensive.
D. No
A. The closing of communication between two hosts.
B. The intial set-up between two communicating hosts.
C. A gesture of frustration from a network administrator.
A. PPP
B. WPA
C. VPN
D. IPSec
E. MAC
A. eBGP
B. NAT (Network Address Translation)
C. CIDR Network address
D. Route Summarization
A. 56k
B. 10-base
C. Gigabit
D. Megabit
A. If the wireless device supports wireless B and the wireless router only supports wireless G.
B. If the wireless device has a MAC address blocked by the wireless router.
C. If the wireless device does not support the security encryption of the wireless router.
D. All of these.
A. 150 m / 492 ft
B. 50m / 164 ft
C. 100m / 328 ft
D. 200 m / 656 ft
A. TCP
B. UDP
A. None of these
B. To ensure stability on the entire network.
C. To gaurantee the IP of the computer/server will not change.
D. To limit the transmision rate of a computer/server.
A. TCP
B. IMAP
C. POP
D. SMTP
A. IP address
B. MAC address
C. Mrbig@proprofs.com
D. Workstation name
E. www.proprofs.com
A. Wide area Network
B. Personal Area Network
C. Internet
D. Local Area Network
A. Yes
B. No
A. Service
B. Protocols
C. Interface
D. Information access
A. Connector
B. Straight through
C. Cross-over
A. 8080
B. 80
C. 21
A. Transport Layer
B. Application Layer
C. Network Layer
D. Session Layer
A. To limit the number of user errors on a network, hence Idiot Proof.
B. To identify an application running on a network.
C. To uniquely identify a host computer on a network.
D. To provide a host computer on the network an identity.
A. 200 m (656 feet)
B. 100 m (328 feet)
C. 60 m (197 feet)
D. 120 m (394 feet)
E. 50 m (164 feet)
A. No
B. Yes
A. One byte at a time.
B. All the data is transfered at once.
C. Through clusters of bits called bytes.
D. Through chunks called packets.
A. None of these
B. Communication
C. Switching
D. Routing
A. Class B with a mask 255.255.0.0 or /16
B. Class A with a mask 255.0.0.0 or /8
C. Class D with a mask 255.255.255.255 or /32
D. Class C with a mask 255.255.255.0 or /24
A. Server
B. Router
C. Fibre
D. Hub/Switch