Network MCQs (101-200) IP Address

Q101. What is the number of usable hosts in a /29 network?
A) 6
B) 8
C) 14
D) 30
Correct Answer: A

Q102. Which subnet mask corresponds to a /27 prefix?
A) 255.255.255.224
B) 255.255.255.240
C) 255.255.255.248
D) 255.255.255.192
Correct Answer: A

Q103. How many subnets are created when borrowing 3 bits from the host portion?
A) 4
B) 6
C) 8
D) 16
Correct Answer: C

Q104. Which of the following is a valid host IP in the subnet 172.16.8.0/21?
A) 172.16.7.255
B) 172.16.8.255
C) 172.16.15.255
D) 172.16.16.1
Correct Answer: B

Q105. What is the first valid host address in 192.168.5.64/26?
A) 192.168.5.63
B) 192.168.5.65
C) 192.168.5.66
D) 192.168.5.62
Correct Answer: B

Q106. The broadcast address for 10.1.4.0/23 is:
A) 10.1.4.255
B) 10.1.5.255
C) 10.1.3.255
D) 10.1.6.255
Correct Answer: B

Q107. The network address for IP 172.31.77.210/20 is:
A) 172.31.64.0
B) 172.31.72.0
C) 172.31.80.0
D) 172.31.96.0
Correct Answer: A

Q108. What is the CIDR notation for subnet mask 255.255.255.128?
A) /24
B) /25
C) /26
D) /27
Correct Answer: B

Q109. How many usable hosts does a /23 network support?
A) 254
B) 510
C) 512
D) 1022
Correct Answer: B

Q110. Which of the following masks provides 16 subnets in a Class C network?
A) 255.255.255.0
B) 255.255.255.128
C) 255.255.255.240
D) 255.255.255.192
Correct Answer: C

Q111. What is the subnet mask for a /18 prefix?
A) 255.255.192.0
B) 255.255.224.0
C) 255.255.240.0
D) 255.255.128.0
Correct Answer: A

Q112. Which of the following networks is not a valid private IP range?
A) 10.0.0.0/8
B) 172.16.0.0/12
C) 192.168.0.0/16
D) 11.0.0.0/8
Correct Answer: D

Q113. How many bits are borrowed in a /26 network?
A) 2
B) 4
C) 6
D) 8
Correct Answer: B

Q114. What is the default gateway for 192.168.1.0/25 network?
A) 192.168.1.0
B) 192.168.1.1
C) 192.168.1.127
D) 192.168.1.128
Correct Answer: B

Q115. Which IP address belongs to the subnet 192.168.2.128/25?
A) 192.168.2.64
B) 192.168.2.100
C) 192.168.2.200
D) 192.168.2.255
Correct Answer: C

Q116. The subnet mask for dividing a Class B network into 256 subnets is:
A) 255.255.255.0
B) 255.255.0.0
C) 255.255.255.255
D) 255.255.255.128
Correct Answer: A

Q117. How many usable hosts are in a /30 network?
A) 2
B) 4
C) 6
D) 8
Correct Answer: A

Q118. Which subnet mask would you use to create 4 equal subnets in 192.168.1.0?
A) 255.255.255.0
B) 255.255.255.192
C) 255.255.255.128
D) 255.255.255.224
Correct Answer: C

Q119. A subnet with mask 255.255.255.248 provides how many usable IPs?
A) 6
B) 8
C) 14
D) 30
Correct Answer: A

Q120. What is the last valid host of 172.20.16.0/20?
A) 172.20.16.254
B) 172.20.31.254
C) 172.20.32.255
D) 172.20.15.255
Correct Answer: B

Q121. Which IP address is a valid broadcast address?
A) 192.168.10.255
B) 172.16.0.0
C) 10.1.1.0
D) 8.8.8.8
Correct Answer: A

Q122. Which address is a valid network ID for a /27 subnet?
A) 10.10.10.30
B) 10.10.10.32
C) 10.10.10.34
D) 10.10.10.33
Correct Answer: B

Q123. What is the number of subnets created when a /24 is subnetted into /28s?
A) 8
B) 12
C) 16
D) 32
Correct Answer: C

Q124. The subnet mask 255.255.255.252 corresponds to how many usable hosts?
A) 1
B) 2
C) 4
D) 8
Correct Answer: B

Q125. Which IP range is part of APIPA (Automatic Private IP Addressing)?
A) 192.168.x.x
B) 172.16.x.x
C) 169.254.x.x
D) 10.x.x.x
Correct Answer: C

Q126. Which of the following is a distance-vector routing protocol?
A) OSPF
B) RIP
C) IS-IS
D) BGP
Correct Answer: B

Q127. What is the administrative distance of OSPF?
A) 90
B) 100
C) 110
D) 120
Correct Answer: C

Q128. Which routing protocol uses Dijkstra’s shortest path first (SPF) algorithm?
A) RIP
B) OSPF
C) BGP
D) EIGRP
Correct Answer: B

Q129. Which of the following is a hybrid routing protocol?
A) RIP
B) OSPF
C) BGP
D) EIGRP
Correct Answer: D

Q130. Which command is used to verify OSPF neighbor relationships on a Cisco router?
A) show ip ospf route
B) show ip ospf neighbors
C) show ospf database
D) show ospf interface
Correct Answer: B

Q131. Which layer 3 protocol is used for inter-domain routing?
A) RIP
B) OSPF
C) BGP
D) EIGRP
Correct Answer: C

Q132. What is the maximum hop count for RIP?
A) 10
B) 15
C) 16
D) 255
Correct Answer: B

Q133. EIGRP uses which metric by default?
A) Hop count
B) Bandwidth and delay
C) Cost
D) Reliability only
Correct Answer: B

Q134. OSPF uses which protocol number in IP headers?
A) 88
B) 89
C) 90
D) 91
Correct Answer: B

Q135. BGP uses which transport protocol?
A) UDP
B) ICMP
C) TCP
D) SCTP
Correct Answer: C

Q136. The default administrative distance of a static route is:
A) 0
B) 1
C) 5
D) 10
Correct Answer: B

Q137. Which protocol prevents routing loops in distance-vector routing?
A) Split horizon
B) Dijkstra
C) SPF
D) Flooding
Correct Answer: A

Q138. Which routing protocol is link-state?
A) RIP
B) IGRP
C) OSPF
D) BGP
Correct Answer: C

Q139. What is the backbone area in OSPF always numbered as?
A) Area 0
B) Area 1
C) Area 10
D) Area 255
Correct Answer: A

Q140. Which of the following commands enables OSPF on Cisco routers?
A) router ospf [process-id]
B) enable ospf
C) ospf on
D) configure ospf
Correct Answer: A

Q141. The function of STP (Spanning Tree Protocol) is to:
A) Increase link speed
B) Prevent broadcast storms
C) Manage IP routing
D) Encrypt VLAN traffic
Correct Answer: B

Q142. Which protocol is used to bundle multiple physical links into one logical link?
A) STP
B) LACP
C) VTP
D) CDP
Correct Answer: B

Q143. VLANs are configured at which OSI layer?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
Correct Answer: B

Q144. The default VLAN for all switch ports is:
A) VLAN 0
B) VLAN 1
C) VLAN 10
D) VLAN 100
Correct Answer: B

Q145. What is the range of normal VLAN IDs?
A) 1–100
B) 1–1001
C) 2–1002
D) 1–4096
Correct Answer: B

Q146. The IEEE standard for VLAN tagging is:
A) 802.1Q
B) 802.3u
C) 802.11n
D) 802.5
Correct Answer: A

Q147. Which of these protocols advertises VLAN information between switches?
A) CDP
B) LLDP
C) VTP
D) STP
Correct Answer: C

Q148. The default STP priority value for a Cisco switch is:
A) 0
B) 32768
C) 4096
D) 65535
Correct Answer: B

Q149. Which device is responsible for inter-VLAN routing?
A) Switch
B) Router
C) Access point
D) Hub
Correct Answer: B

Q150. Which port type carries traffic for multiple VLANs?
A) Access port
B) Trunk port
C) Routed port
D) Management port
Correct Answer: B

Q151. Which of the following is a WAN protocol?
A) Ethernet
B) Frame Relay
C) Token Ring
D) FDDI
Correct Answer: B

Q152. Which layer does PPP operate at?
A) Data Link
B) Network
C) Transport
D) Application
Correct Answer: A

Q153. Which of the following provides dynamic bandwidth allocation in Frame Relay?
A) CIR
B) DE
C) FECN
D) BECN
Correct Answer: A

Q154. MPLS stands for:
A) Multi-Protocol Label Switching
B) Multiple Path Link Switching
C) Multi-Packet Layer System
D) Multi-Point Line Service
Correct Answer: A

Q155. Which WAN technology uses labels for forwarding decisions?
A) MPLS
B) ATM
C) Frame Relay
D) PPP
Correct Answer: A

Q156. PPPoE stands for:
A) Point-to-Point over Ethernet
B) Peer-to-Peer over Ethernet
C) Packet Path over Ethernet
D) Port-to-Port over Ethernet
Correct Answer: A

Q157. Which encapsulation type is used by Frame Relay?
A) HDLC
B) LAPF
C) LAPB
D) SLIP
Correct Answer: B

Q158. Which of the following is a connection-oriented WAN protocol?
A) Frame Relay
B) ATM
C) PPP
D) MPLS
Correct Answer: B

Q159. The LCP (Link Control Protocol) is part of which WAN technology?
A) PPP
B) MPLS
C) ATM
D) Frame Relay
Correct Answer: A

Q160. Which protocol is used to establish VPN tunnels over the Internet?
A) HTTP
B) GRE
C) FTP
D) DNS
Correct Answer: B

Q161. IPSec operates at which layer of the OSI model?
A) Transport
B) Network
C) Data Link
D) Application
Correct Answer: B

Q162. Which of the following provides secure site-to-site VPN connections?
A) PPTP
B) L2TP
C) IPSec
D) GRE
Correct Answer: C

Q163. Which VPN protocol uses SSL for encryption?
A) L2TP
B) IPSec
C) PPTP
D) OpenVPN
Correct Answer: D

Q164. What port does PPTP use by default?
A) 80
B) 1723
C) 500
D) 443
Correct Answer: B

Q165. Which of these protocols uses port 1701?
A) PPTP
B) L2TP
C) IPSec
D) GRE
Correct Answer: B

Q166. The purpose of GRE tunneling is to:
A) Encrypt packets
B) Encapsulate packets for transport
C) Compress packets
D) Filter packets
Correct Answer: B

Q167. Which of the following uses both IPsec and L2TP together for VPNs?
A) PPTP
B) SSL VPN
C) L2TP/IPSec
D) GRE
Correct Answer: C

Q168. What is the default port for IKE (Internet Key Exchange)?
A) 22
B) 50
C) 500
D) 1701
Correct Answer: C

Q169. Which IPsec mode encrypts both the header and the payload?
A) Transport mode
B) Tunnel mode
C) L2TP mode
D) GRE mode
Correct Answer: B

Q170. MPLS labels are assigned by which component?
A) Router
B) LSR (Label Switch Router)
C) Switch
D) Hub
Correct Answer: B

Q171. Which of the following is a VPN tunneling protocol?
A) HTTPS
B) L2TP
C) SMTP
D) SNMP
Correct Answer: B

Q172. Which PPP feature is used for authentication?
A) LCP
B) NCP
C) PAP/CHAP
D) HDLC
Correct Answer: C

Q173. The default encapsulation for serial interfaces on Cisco routers is:
A) HDLC
B) PPP
C) Frame Relay
D) MPLS
Correct Answer: A

Q174. Which WAN technology provides fixed-size cells for transmission?
A) Frame Relay
B) ATM
C) MPLS
D) PPP
Correct Answer: B

Q175. The Committed Information Rate (CIR) in Frame Relay defines:
A) The maximum burst rate
B) The guaranteed bandwidth
C) The peak data rate
D) The encapsulation type
Correct Answer: B

Q176. Which of the following is a network security protocol used to provide confidentiality and integrity over IP networks?
A) SSH
B) IPSec
C) HTTP
D) SNMP
Correct Answer: B

Q177. Which port number does SSH use?
A) 20
B) 21
C) 22
D) 23
Correct Answer: C

Q178. Which security protocol replaced SSL?
A) TLS
B) IPSec
C) HTTPS
D) PPTP
Correct Answer: A

Q179. Which of these is an example of symmetric encryption?
A) RSA
B) Diffie-Hellman
C) AES
D) ECC
Correct Answer: C

Q180. What does IDS stand for?
A) Internet Defense System
B) Intrusion Detection System
C) Internal Data Security
D) Integrated Defense Setup
Correct Answer: B

Q181. What is the main function of a firewall?
A) Encrypt traffic
B) Filter incoming and outgoing traffic
C) Assign IP addresses
D) Monitor link utilization
Correct Answer: B

Q182. Which protocol is used for secure web browsing?
A) HTTP
B) HTTPS
C) FTP
D) TELNET
Correct Answer: B

Q183. Which of these is a type of DoS attack?
A) Smurf attack
B) Port scanning
C) Phishing
D) Keylogging
Correct Answer: A

Q184. Which type of malware demands payment from the user?
A) Virus
B) Worm
C) Ransomware
D) Spyware
Correct Answer: C

Q185. WPA3 uses which encryption algorithm?
A) TKIP
B) RC4
C) AES
D) DES
Correct Answer: C

Q186. The function of an Intrusion Prevention System (IPS) is to:
A) Detect and block malicious activity
B) Monitor only network traffic
C) Encrypt data in transit
D) Manage user authentication
Correct Answer: A

Q187. Which of the following operates in promiscuous mode to detect network intrusions?
A) Firewall
B) IDS
C) Router
D) Proxy
Correct Answer: B

Q188. WPA2 uses which encryption protocol?
A) WEP
B) AES
C) RC4
D) TKIP
Correct Answer: B

Q189. Which wireless frequency offers longer range but slower speed?
A) 2.4 GHz
B) 5 GHz
C) 6 GHz
D) 60 GHz
Correct Answer: A

Q190. Which IEEE standard defines Wi-Fi?
A) 802.11
B) 802.3
C) 802.15
D) 802.16
Correct Answer: A

Q191. Which Wi-Fi standard supports speeds up to 600 Mbps?
A) 802.11a
B) 802.11b
C) 802.11n
D) 802.11g
Correct Answer: C

Q192. The technology used for short-range wireless communication between devices is:
A) Wi-Fi
B) ZigBee
C) Bluetooth
D) NFC
Correct Answer: C

Q193. Which of the following is not a wireless security protocol?
A) WPA
B) WEP
C) WAP
D) WPA2
Correct Answer: C

Q194. Which device acts as a bridge between wireless and wired networks?
A) Hub
B) Router
C) Access Point
D) Switch
Correct Answer: C

Q195. What is the default channel width for 802.11n?
A) 10 MHz
B) 20 MHz
C) 40 MHz
D) 80 MHz
Correct Answer: B

Q196. Which wireless standard introduced MU-MIMO technology?
A) 802.11ac
B) 802.11n
C) 802.11g
D) 802.11a
Correct Answer: A

Q197. What is the maximum data rate of 802.11ac?
A) 300 Mbps
B) 1 Gbps
C) 6.9 Gbps
D) 10 Gbps
Correct Answer: C

Q198. Which Wi-Fi standard operates only in the 5 GHz band?
A) 802.11n
B) 802.11ac
C) 802.11b
D) 802.11g
Correct Answer: B

Q199. The process of hiding SSID in a Wi-Fi network is done for:
A) Security by obscurity
B) Increasing signal range
C) Reducing bandwidth
D) Improving speed
Correct Answer: A

Q200. Which security protocol uses a four-way handshake for authentication?
A) WEP
B) WPA2
C) WPA
D) SSL
Correct Answer: B

Leave a Comment

Your email address will not be published. Required fields are marked *

You cannot copy content of this page

Scroll to Top