Sign In
Computer Science

Networking Quiz & Flashcards

Master Networking concepts with our interactive study cards featuring 52 practice Quiz questions and 51 flashcards to boost your exam scores and retention in Computer Science.

Create your own study sets

Turn any PDF, lecture notes, or ChatGPT conversation into interactive quizzes in seconds.

Get started

52 Multiple Choice Questions and Answers on Networking

Revise and practice with 52 comprehensive MCQ on Networking, featuring detailed explanations to deepen your understanding of Computer Science Quiz concepts. Perfect for quick review and exam preparation.

1 Which layer of the OSI model is responsible for routing?

A. Network
B. Transport
C. Data Link
D. Application
Explanation

The Network layer is responsible for routing data packets between devices on a network.

2 What is the primary function of a DHCP server?

A. Assign IP addresses
B. Resolve domain names
C. Encrypt data
D. Route packets
Explanation

A DHCP server automatically assigns IP addresses to devices on a network.

3 What does the acronym TCP stand for?

A. Transmission Control Protocol
B. Transfer Communication Protocol
C. Trusted Connection Path
D. Transport Control Process
Explanation

TCP stands for Transmission Control Protocol, which ensures reliable data transmission.

4 Which protocol is used to send emails?

A. SMTP
B. HTTP
C. FTP
D. SNMP
Explanation

SMTP (Simple Mail Transfer Protocol) is used for sending emails.

5 How does a switch differ from a router?

A. Switches operate on MAC addresses, routers operate on IP addresses.
B. Switches connect networks, routers connect devices.
C. Switches are slower than routers.
D. Switches provide internet, routers share it.
Explanation

Switches use MAC addresses to forward data within a network, while routers use IP addresses to route data between networks.

6 What is the function of a NAT router?

A. Translate private IP addresses to public
B. Broadcast data to all devices
C. Encrypt network traffic
D. Assign DNS names
Explanation

NAT routers translate private IP addresses to public addresses for internet access.

7 Which protocol is used to ensure secure communication over the internet?

A. TLS
B. FTP
C. SMTP
D. ARP
Explanation

TLS (Transport Layer Security) encrypts data for secure internet communication.

8 What is a primary characteristic of UDP?

A. Connectionless
B. Reliable
C. Connection-oriented
D. Stateful
Explanation

UDP is a connectionless protocol, meaning it does not establish a connection before sending data.

9 Why are IPv6 addresses important?

A. They provide a larger address space.
B. They are easier to remember.
C. They are faster than IPv4.
D. They are compatible with IPv4.
Explanation

IPv6 addresses provide a larger address space to accommodate more devices on the internet.

10 What does a firewall do?

A. Monitors and controls network traffic
B. Assigns IP addresses
C. Translates domain names
D. Connects devices wirelessly
Explanation

Firewalls monitor and control incoming and outgoing network traffic based on security rules.

11 Which device is used to connect a local network to the internet?

A. Router
B. Switch
C. Hub
D. Access Point
Explanation

A router connects a local network to the internet and directs data traffic.

12 What is a VPN primarily used for?

A. Securely connect to a private network over the internet
B. Increase bandwidth
C. Assign IP addresses
D. Speed up data transmission
Explanation

VPNs are used to securely connect to a private network over the internet, often for remote work.

13 Which protocol is responsible for assigning dynamic IP addresses?

A. DHCP
B. DNS
C. HTTP
D. FTP
Explanation

DHCP (Dynamic Host Configuration Protocol) assigns dynamic IP addresses to devices on a network.

14 What is the main advantage of a mesh network?

A. Redundancy and reliability
B. Simpler setup
C. Less interference
D. Lower cost
Explanation

Mesh networks offer redundancy and reliability as each node can connect to multiple nodes, ensuring consistent connectivity.

15 Which network topology involves a central hub?

A. Star
B. Ring
C. Mesh
D. Bus
Explanation

A star topology connects all devices to a central hub, which is the main communication point.

16 What does the acronym DNS stand for?

A. Domain Name System
B. Dynamic Network Service
C. Data Node Series
D. Digital Name System
Explanation

DNS stands for Domain Name System, which translates domain names to IP addresses.

17 How does a proxy server enhance security?

A. Acts as an intermediary, hiding client IPs
B. Encrypts all data
C. Provides virus protection
D. Speeds up internet access
Explanation

A proxy server acts as an intermediary, hiding client IP addresses and filtering requests for security.

18 What is the purpose of a subnet mask?

A. Divide an IP address into network and host parts
B. Encrypt data
C. Speed up data transmission
D. Assign IP addresses
Explanation

A subnet mask divides an IP address into network and host parts, facilitating data routing.

19 Which protocol is typically used for secure file transfers?

A. SFTP
B. FTP
C. HTTP
D. SMTP
Explanation

SFTP (Secure File Transfer Protocol) is used for secure file transfers over a network.

20 What is the primary function of an access point?

A. Extend a wireless network
B. Assign IP addresses
C. Route data packets
D. Encrypt data
Explanation

An access point connects wireless devices to a wired network, extending the network's range.

21 What is the main role of the transport layer in the OSI model?

A. Ensures reliable data transfer
B. Routes data packets
C. Establishes network connections
D. Encrypts data
Explanation

The transport layer ensures reliable data transfer by managing error detection and correction.

22 What does QoS manage in a network?

A. Network resource allocation
B. IP address assignment
C. Domain name resolution
D. Network topology mapping
Explanation

Quality of Service (QoS) manages network resource allocation by setting priorities for specific types of data.

23 Why is HTTPS preferred over HTTP?

A. It encrypts data for secure transmission
B. It is faster
C. It uses less bandwidth
D. It is easier to implement
Explanation

HTTPS encrypts data for secure transmission, protecting it from interception.

24 What is the primary purpose of a load balancer?

A. Distribute network traffic across multiple servers
B. Encrypt data
C. Route data packets
D. Block unauthorized access
Explanation

A load balancer distributes network traffic across multiple servers to improve responsiveness and availability.

25 Which protocol is used to translate domain names into IP addresses?

A. DNS
B. DHCP
C. HTTP
D. FTP
Explanation

DNS (Domain Name System) translates domain names into IP addresses, facilitating access to websites.

26 What is the function of a MAC address in networking?

A. Uniquely identify a device on a network
B. Encrypt data
C. Route packets
D. Provide internet access
Explanation

A MAC address uniquely identifies a device on a local network, enabling network communication.

27 How does a VLAN improve network management?

A. Segments a network into isolated sections
B. Increases network speed
C. Reduces network cost
D. Simplifies hardware requirements
Explanation

A VLAN segments a network into isolated sections, improving management and security.

28 What is the primary function of a modem?

A. Modulate and demodulate signals for data transmission
B. Route data packets
C. Assign IP addresses
D. Encrypt data
Explanation

A modem modulates and demodulates signals for data transmission over telephone lines or cable systems.

29 What is a common use case for BGP?

A. Exchanging routing information between ISPs
B. Assigning IP addresses
C. Encrypting data
D. Connecting wireless devices
Explanation

BGP (Border Gateway Protocol) is used for exchanging routing information between ISPs on the internet.

30 Which type of network traffic does a broadcast domain include?

A. Broadcast frames
B. Multicast frames
C. Unicast frames
D. Encrypted frames
Explanation

A broadcast domain includes broadcast frames, which are sent to all devices on a network segment.

31 What is the primary advantage of using NAT?

A. Conserve public IP addresses
B. Increase network speed
C. Simplify network setup
D. Enhance data encryption
Explanation

NAT conserves public IP addresses by allowing multiple devices on a local network to share a single public IP address.

32 How does ARP facilitate network communication?

A. Translates IP addresses to MAC addresses
B. Encrypts data
C. Assigns dynamic IP addresses
D. Routes data packets
Explanation

ARP (Address Resolution Protocol) translates IP addresses to MAC addresses, enabling communication on a local network.

33 What is the primary function of a DNS server?

A. Resolve domain names to IP addresses
B. Assign IP addresses
C. Encrypt data
D. Route packets
Explanation

A DNS server resolves domain names to IP addresses, facilitating access to websites and services.

34 Which protocol is used to establish a connection-oriented communication?

A. TCP
B. UDP
C. IP
D. HTTP
Explanation

TCP (Transmission Control Protocol) is used to establish a connection-oriented communication, ensuring reliable data transmission.

35 What is a common method to test network connectivity?

A. Ping
B. Traceroute
C. DNS lookup
D. Subnetting
Explanation

Ping is a network utility used to test the reachability of a host and measure round-trip time for messages.

36 How does a denial-of-service attack disrupt a network?

A. Overwhelms it with excessive requests
B. Steals data
C. Encrypts all traffic
D. Assigns incorrect IP addresses
Explanation

A denial-of-service attack overwhelms a network or service with excessive requests, disrupting its normal function.

37 Which layer of the OSI model handles data encryption?

A. Presentation
B. Transport
C. Network
D. Data Link
Explanation

The Presentation layer handles data encryption, ensuring secure data transmission.

38 What is the role of a switch in a network?

A. Forward data to specific devices
B. Connect network segments
C. Assign IP addresses
D. Translate domain names
Explanation

A switch forwards data to specific devices within a network, enhancing efficiency by avoiding unnecessary data broadcasts.

39 What is the primary purpose of a traceroute command?

A. Track the pathway of packets
B. Encrypt network traffic
C. Assign IP addresses
D. Connect devices wirelessly
Explanation

Traceroute tracks the pathway packets take from a source to a destination, identifying routing paths and delays.

40 How does a honeypot improve network security?

A. Attracts and deflects unauthorized access attempts
B. Encrypts all data
C. Speeds up network access
D. Assigns IP addresses securely
Explanation

A honeypot attracts and deflects unauthorized access attempts, allowing security teams to study potential threats.

41 What is a key feature of an SSID in networking?

A. Identifies a wireless network
B. Encrypts data
C. Assigns IP addresses
D. Routes packets
Explanation

An SSID (Service Set Identifier) identifies a wireless network, allowing devices to connect to the correct network.

42 How does symmetric encryption differ from asymmetric encryption?

A. Uses the same key for encryption and decryption
B. Is slower
C. Is always more secure
D. Uses a public key to encrypt and decrypt
Explanation

Symmetric encryption uses the same key for both encryption and decryption, unlike asymmetric encryption, which uses a pair of keys.

43 What is the primary function of a router in a network?

A. Direct data packets between networks
B. Encrypt data
C. Assign IP addresses
D. Provide wireless access
Explanation

A router directs data packets between networks, determining the best path for them to travel.

44 Which layer of the OSI model is responsible for establishing dialogs between applications?

A. Session
B. Transport
C. Network
D. Application
Explanation

The Session layer is responsible for establishing, managing, and terminating dialogs between applications.

45 What is the main advantage of using IPv6 over IPv4?

A. Larger address space
B. Faster speed
C. Compatibility with IPv4
D. Simpler configuration
Explanation

IPv6 provides a larger address space, accommodating more devices than IPv4.

46 Which protocol is commonly used for real-time streaming?

A. RTP
B. HTTP
C. SMTP
D. FTP
Explanation

RTP (Real-time Transport Protocol) is commonly used for real-time streaming of audio and video.

47 What does ARP stand for in networking?

A. Address Resolution Protocol
B. Advanced Routing Process
C. Automatic Repeat Request
D. Active Response Protocol
Explanation

ARP stands for Address Resolution Protocol, which translates IP addresses to MAC addresses on a local network.

48 What is the primary function of a packet filter firewall?

A. Allow or block packets based on rules
B. Encrypt all incoming data
C. Assign IP addresses
D. Route data packets
Explanation

A packet filter firewall allows or blocks packets based on predefined rules, such as IP addresses or ports.

49 Which layer of the OSI model is responsible for error detection and correction?

A. Data Link
B. Network
C. Transport
D. Application
Explanation

The Data Link layer is responsible for error detection and correction in data frames.

50 What is the primary purpose of port forwarding?

A. Allow external devices to access services on a local network
B. Encrypt data
C. Route data packets
D. Increase bandwidth
Explanation

Port forwarding allows external devices to access services on a local network through specific ports.

51 Which layer of the OSI model is responsible for data formatting and encryption?

A. Presentation
B. Transport
C. Network
D. Data Link
Explanation

The Presentation layer is responsible for data formatting and encryption, ensuring data is presented correctly to the application layer.

52 What is the primary role of the application layer in the OSI model?

A. Provide network services to applications
B. Encrypt data
C. Route packets
D. Establish network connections
Explanation

The Application layer provides network services directly to user applications, facilitating data exchange.