0% found this document useful (0 votes)
8 views

Networking

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Networking

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

NAME: ____________________________ GR. & SEC.

____________________ DATE: ______/______/______

Multiple Choice: Questions about Basic Networking Concepts:(40pts.)

I. Instructions: Choose the best answer for each question.

1. What is the primary function of TCP/IP?


a) Managing network security protocols.
b) Transmitting data packets between networks.
c) Translating domain names into IP addresses.
d) Controlling access to network resources.
Answer: b)

2. Which OSI layer handles the logical addressing of data packets?


a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
Answer: c)

3. What is the main purpose of a router in a network?


a) To connect devices within a single local area network (LAN).
b) To filter unwanted network traffic based on security rules.
c) To direct data packets between different networks.
d) To amplify and regenerate network signals.
Answer: c)

4. How does a network switch differ from a network hub?


a) Switches broadcast data to all ports; hubs send data to specific ports.
b) Switches use MAC addresses for targeted data forwarding; hubs broadcast to all.
c) Hubs are wireless; switches are wired.
d) Switches manage network security; hubs manage network traffic.
Answer: b)

5. What does an IP address uniquely identify?


a) A specific network device's physical location.
b) A specific network device on a network.
c) The type of network cable used.
d) The manufacturer of a network device.
Answer: b)

6. What is the primary role of a subnet mask?


a) To encrypt data transmitted across a network.
b) To define the network portion of an IP address.
c) To control access to network resources.
d) To determine the speed of a network connection.
Answer: b)

7. What service does a DNS server provide?


a) Email delivery and retrieval.
b) File transfer between computers.
c) Translation of domain names to IP addresses.
d) Network security through firewall functionality.

1|Page
Answer: c)

8. What is a MAC address?


a) A unique identifier assigned to a network interface card.
b) A user-defined name for a network device.
c) A type of network security protocol.
d) A measure of network bandwidth.
Answer: a)

9. What is a network protocol?


a) A type of network cable.
b) A set of rules governing data communication.
c) A physical network device.
d) A software application for network management.
Answer: b)

10. What is a key difference between IPv4 and IPv6?


a) IPv6 uses a longer address, offering significantly more addresses.
b) IPv4 is wireless; IPv6 is wired.
c) IPv4 is more secure than IPv6.
d) IPv6 is only used for local area networks.
Answer: a)

II. Network Security:

11. What is the primary function of a firewall?


a) To encrypt network data.
b) To control network traffic based on predefined rules.
c) To detect and remove viruses from computers.
d) To manage network user accounts.
Answer: b)

12. What does a VPN provide?


a) Faster internet speeds.
b) Enhanced network security through encryption.
c) Access to restricted websites.
d) Improved network bandwidth.
Answer: b)

13. What characterizes a DDoS attack?


a) A single computer attempting to overwhelm a server.
b) Multiple computers flooding a network with traffic to disrupt service.
c) A virus infecting multiple computers.
d) A phishing attempt to steal user credentials.
Answer: b)

14. What is a defining characteristic of a phishing attack?


a) Using malware to infect computers.
b) Attempting to trick users into revealing sensitive information.
c) Overloading a network with traffic.
d) Disrupting network services through denial of service.
Answer: b)

15. What is malware?

2|Page
a) A type of network cable.
b) A software program designed to harm a computer system.
c) A network topology.
d) A network protocol.
Answer: b)

III. Network Topologies:

16. What describes a star topology?


a) Devices connected in a ring.
b) Devices connected to a central hub or switch.
c) Devices connected in a linear fashion.
d) Devices connected in a fully interconnected manner.
Answer: b)

17. What is a defining feature of a bus topology?


a) All devices share a single communication cable.
b) Devices are connected in a circular arrangement.
c) Devices connect to a central node.
d) Devices have multiple connections to other devices.
Answer: a)

18. What characterizes a ring topology?


a) Devices are connected in a linear fashion.
b) Devices are connected to a central hub.
c) Devices are connected in a closed loop.
d) Devices have multiple connections for redundancy.
Answer: c)

19. What is a key advantage of a mesh topology?


a) Simplicity and ease of setup.
b) High redundancy and fault tolerance.
c) Low cost and minimal cabling.
d) High speed and low latency.
Answer: b)

20. Which network topology generally offers the greatest resilience to failures?
a) Bus topology
b) Star topology
c) Ring topology
d) Mesh topology
Answer: d)

IV. Network Devices:

21. What is the primary function of a modem?


a) To connect devices within a local area network.
b) To convert digital signals to analog signals and vice versa.
c) To route data packets between different networks.
d) To amplify network signals.
Answer: b)

22. What is the main purpose of a network switch?


a) To convert digital signals to analog signals.
b) To connect devices on a LAN and forward data to specific ports.

3|Page
c) To route data packets between different networks.
d) To provide network security.
Answer: b)

23. What is the role of a network bridge?


a) To amplify network signals.
b) To connect two different networks.
c) To manage network security.
d) To convert digital signals to analog signals.
Answer: b)

24. What is the function of a repeater in a network?


a) To route data packets between different networks.
b) To amplify and retransmit network signals.
c) To connect devices within a local area network.
d) To provide network security.
Answer: b)

25. What is the behavior of a network hub?


a) It forwards data to a specific port based on MAC addresses.
b) It broadcasts data to all connected ports.
c) It routes data packets between different networks.
d) It provides network security.
Answer: b)

V. Network Protocols:

26. Which protocol is primarily used for file transfer?


a) HTTP (Hypertext Transfer Protocol)
b) SMTP (Simple Mail Transfer Protocol)
c) FTP (File Transfer Protocol)
d) DNS (Domain Name System)
Answer: c)

27. Which protocol is the foundation of web browsing?


a) FTP (File Transfer Protocol)
b) SMTP (Simple Mail Transfer Protocol)
c) HTTP (Hypertext Transfer Protocol)
d) TCP (Transmission Control Protocol)
Answer: c)

28. Which protocol is fundamentally used for sending emails?


a) POP3 (Post Office Protocol version 3)
b) IMAP (Internet Message Access Protocol)
c) SMTP (Simple Mail Transfer Protocol)
d) HTTP (Hypertext Transfer Protocol)
Answer: c)

29. Which protocol is commonly used for receiving emails?


a) SMTP (Simple Mail Transfer Protocol)
b) FTP (File Transfer Protocol)
c) POP3 (Post Office Protocol version 3)
d) DNS (Domain Name System)
Answer: c)

4|Page
30. Which protocol is known for its connection-oriented and reliable data transmission?
a) UDP (User Datagram Protocol)
b) IP (Internet Protocol)
c) TCP (Transmission Control Protocol)
d) ICMP (Internet Control Message Protocol)
Answer: c)

VI. Wireless Networking:

31. What does Wi-Fi stand for?


a) Wireless Internet Frequency
b) Wireless Fidelity
c) Wireless Fiber Internet
d) Wireless Network Interface
Answer: b)

32. What is the primary function of a wireless access point (WAP)?


a) To connect wireless devices to a wired network.
b) To encrypt wireless network traffic.
c) To manage network user accounts.
d) To amplify wireless signals.
Answer: a)

33. What type of communication does Bluetooth primarily support?


a) Long-range, high-bandwidth communication.
b) Short-range, low-bandwidth communication.
c) Long-range, low-bandwidth communication.
d) Short-range, high-bandwidth communication.
Answer: b)

34. How does 5 GHz Wi-Fi generally compare to 2.4 GHz Wi-Fi?
a) 5 GHz offers slower speeds and shorter range.
b) 5 GHz offers faster speeds but shorter range.
c) 5 GHz offers faster speeds and longer range.
d) 5 GHz and 2.4 GHz offer identical performance.
Answer: b)

35. What does the SSID represent in a wireless network?


a) The security protocol used on the network.
b) The network's password.
c) The network's name.
d) The MAC address of the wireless router.
Answer: c)

VII. Network Performance:

36. What does bandwidth measure?


a) The speed of a single data packet.
b) The amount of data that can be transmitted over a given time.
c) The delay in data transmission.
d) The number of devices connected to a network.
Answer: b)

5|Page
37. What is latency in network communication?
a) The amount of data successfully transmitted.
b) The delay in data transmission.
c) The maximum amount of data a network can handle.
d) The variations in data transmission speed.
Answer: b)

38. What does network throughput represent?


a) The theoretical maximum data transmission rate.
b) The actual amount of data successfully transmitted.
c) The delay in data transmission.
d) The variations in data transmission speed.
Answer: b)

39. What does jitter refer to in network performance?


a) The amount of data lost during transmission.
b) Variations in latency during data transmission.
c) The speed of a network connection.
d) The maximum amount of data a network can handle.
Answer: b)

40. What is packet loss in network communication?


a) Data packets that are delayed in transmission.
b) Data packets that fail to reach their destination.
c) Data packets that are corrupted during transmission.
d) Data packets that are encrypted during transmission.
Answer: b)

6|Page

You might also like