Network MCQs (301-400)
Q301. Which of the following routing protocols is considered a link-state protocol?
A) RIP
B) EIGRP
C) OSPF
D) BGP
✅ Correct Answer: C
Q302. In the context of OSPF, what does the acronym DR stand for?
A) Designated Router
B) Data Router
C) Dynamic Route
D) Default Router
✅ Correct Answer: A
Q303. What is the default administrative distance for OSPF?
A) 110
B) 120
C) 90
D) 1
✅ Correct Answer: A
Q304. What is the purpose of a “routing loop”?
A) To efficiently share network load
B) To direct traffic to the most optimal path
C) To prevent data from being sent to unreachable destinations
D) To cause packets to circulate between routers endlessly
✅ Correct Answer: D
Q305. Which of the following protocols does not use a metric to determine the best path?
A) OSPF
B) RIP
C) BGP
D) EIGRP
✅ Correct Answer: C
Q306. In the context of routing, what does the term “metric” refer to?
A) A fixed time for packet delivery
B) A measurement used to determine the best route
C) The IP address of the next hop
D) The number of routers in a network
✅ Correct Answer: B
Q307. Which type of routing protocol is BGP?
A) Distance-vector
B) Link-state
C) Path-vector
D) Hybrid
✅ Correct Answer: C
Q308. Which of the following statements is true about RIP?
A) It is a link-state protocol.
B) It supports variable-length subnet masks (VLSM).
C) It uses hop count as its metric.
D) It is used for large enterprise networks.
✅ Correct Answer: C
Q309. What is the primary purpose of a “stub network” in routing?
A) To handle dynamic routing in remote locations
B) To avoid routing loops
C) To connect two routers in a network
D) To provide a simplified routing path for smaller networks
✅ Correct Answer: D
Q310. In an IPv6 address, how many bits are used for the network prefix?
A) 32
B) 64
C) 128
D) 48
✅ Correct Answer: B
Q311. Which of the following is a feature of the DHCP protocol?
A) Assigns static IP addresses
B) Automatically assigns IP addresses to hosts
C) Encrypts IP traffic
D) Resolves domain names to IP addresses
✅ Correct Answer: B
Q312. What type of address is used in IPv6 for communication between nodes on the same link?
A) Unicast
B) Anycast
C) Multicast
D) Link-local
✅ Correct Answer: D
Q313. What does the term “NAT overload” refer to?
A) Multiple IP addresses mapping to a single public address
B) Filtering of unauthorized traffic
C) Multiple routers forwarding traffic for the same IP
D) Automatic IP address assignment in a private network
✅ Correct Answer: A
Q314. Which of the following protocols is used to obtain IP address information automatically?
A) DNS
B) DHCP
C) FTP
D) POP3
✅ Correct Answer: B
Q315. In network security, which of the following attacks involves an attacker intercepting data between two parties?
A) Man-in-the-Middle
B) Denial-of-Service
C) SQL Injection
D) Phishing
✅ Correct Answer: A
Q316. Which of the following is true regarding TLS (Transport Layer Security)?
A) It is used to encrypt HTTP traffic.
B) It is an older protocol that has been replaced by SSL.
C) It is only used in VPNs.
D) It cannot be used to secure email communication.
✅ Correct Answer: A
Q317. What does the “SSL handshake” primarily accomplish?
A) Authenticate the server and the client
B) Encrypt the application data
C) Resolve domain names to IP addresses
D) Establish the route for data to travel
✅ Correct Answer: A
Q318. Which of the following is a function of a VPN (Virtual Private Network)?
A) Allowing multiple users to share the same IP address
B) Securing data by encrypting traffic over public networks
C) Optimizing the speed of a network connection
D) Assigning IP addresses to a local area network
✅ Correct Answer: B
Q319. In the context of IP security, what does IPSec stand for?
A) Internet Protocol Security
B) Internet Protocol Session
C) Integrated Protection Security
D) Internet Private Secure
✅ Correct Answer: A
Q320. Which of the following is a type of denial-of-service (DoS) attack?
A) DNS Spoofing
B) TCP SYN Flood
C) Phishing
D) SQL Injection
✅ Correct Answer: B
Q321. What is the purpose of the “Access Control List” (ACL) in networking?
A) To encrypt data packets
B) To assign IP addresses dynamically
C) To control inbound and outbound traffic
D) To perform load balancing
✅ Correct Answer: C
Q322. Which of the following network devices operates at Layer 2 of the OSI model?
A) Switch
B) Router
C) Firewall
D) Hub
✅ Correct Answer: A
Q323. Which security protocol is used to secure the communication between a browser and a web server?
A) SSL
B) IPsec
C) SSH
D) SNMP
✅ Correct Answer: A
Q324. Which of the following is used to prevent unauthorized access to a network by verifying the identity of devices?
A) Firewalls
B) VPNs
C) Authentication protocols
D) Encryption
✅ Correct Answer: C
Q325. Which device is typically used to segment a network into smaller broadcast domains?
A) Router
B) Switch
C) Hub
D) Bridge
✅ Correct Answer: A
Q326. What does the term “port forwarding” refer to in networking?
A) Sending data packets from one IP address to another
B) Redirecting network traffic to specific devices based on port numbers
C) Blocking network traffic based on IP addresses
D) Assigning IP addresses dynamically
✅ Correct Answer: B
Q327. In wireless networking, what does SSID stand for?
A) Secure Session Identification
B) Secure Service Internet Domain
C) Service Set Identifier
D) Session Set Identifier
✅ Correct Answer: C
Q328. Which of the following is an advantage of using a proxy server?
A) It provides encryption for all network traffic.
B) It hides the internal network’s IP addresses.
C) It accelerates data transmission by increasing bandwidth.
D) It automatically assigns IP addresses.
✅ Correct Answer: B
Q329. What is the function of the “NTP” (Network Time Protocol)?
A) To resolve domain names into IP addresses
B) To synchronize clocks of networked devices
C) To encrypt communication between devices
D) To monitor network traffic
✅ Correct Answer: B
Q330. Which of the following is the purpose of a VLAN?
A) To provide physical network isolation
B) To group devices into the same broadcast domain regardless of physical location
C) To secure the network traffic from external threats
D) To assign IP addresses to devices dynamically
✅ Correct Answer: B
Q331. What does the term “ping of death” refer to?
A) A network denial-of-service attack using a large ping packet
B) A technique to measure network performance
C) A type of error packet generated by a router
D) A diagnostic command used to test DNS servers
✅ Correct Answer: A
Q332. Which type of cable is commonly used for high-speed network connections?
A) Fiber optic
B) Coaxial
C) Twisted pair
D) Serial cable
✅ Correct Answer: A
Q333. What is the function of a load balancer in a network?
A) To monitor network traffic
B) To distribute traffic evenly across multiple servers
C) To encrypt network data
D) To assign dynamic IP addresses
✅ Correct Answer: B
Q334. Which of the following is a major disadvantage of a hub?
A) It can only connect to a single device
B) It causes broadcast traffic to be sent to all devices
C) It increases network speed
D) It operates at the Network layer
✅ Correct Answer: B
Q335. What is the primary role of the ARP (Address Resolution Protocol) in networking?
A) Resolve domain names to IP addresses
B) Resolve IP addresses to MAC addresses
C) Encrypt network traffic
D) Assign IP addresses dynamically
✅ Correct Answer: B
Q336. Which of the following is used to assign IP addresses dynamically?
A) DNS
B) DHCP
C) HTTP
D) FTP
✅ Correct Answer: B
Q337. What is the most common type of network used in homes and small offices?
A) LAN
B) WAN
C) MAN
D) VPN
✅ Correct Answer: A
Q338. Which device is used to connect two different networks?
A) Switch
B) Hub
C) Router
D) Bridge
✅ Correct Answer: C
Q339. What does the term “bandwidth” refer to in networking?
A) The physical size of a network cable
B) The amount of data transmitted over a network in a given period
C) The number of devices connected to a network
D) The time it takes for a packet to travel from source to destination
✅ Correct Answer: B
Q340. Which of the following is a characteristic of IPv6?
A) It uses 32-bit addresses
B) It uses the same address format as IPv4
C) It allows for a larger address space than IPv4
D) It does not support routing
✅ Correct Answer: C
Q341. Which of the following is the main function of the transport layer in the OSI model?
A) Routing data between networks
B) Encrypting data
C) Ensuring reliable data transfer between devices
D) Formatting data for the application layer
✅ Correct Answer: C
Q342. Which of the following is true about MAC addresses?
A) They are used to route data between different networks
B) They are globally unique identifiers for network interfaces
C) They are assigned by the operating system
D) They are only used in IPv6 networks
✅ Correct Answer: B
Q343. In a switched network, which device forwards frames based on MAC addresses?
A) Router
B) Switch
C) Hub
D) Bridge
✅ Correct Answer: B
Q344. Which protocol is used to translate human-readable domain names into IP addresses?
A) SMTP
B) DNS
C) DHCP
D) FTP
✅ Correct Answer: B
Q345. What is the maximum number of devices that can be connected to a Class C IP address subnet with a 255.255.255.0 subnet mask?
A) 254
B) 256
C) 128
D) 62
✅ Correct Answer: A
Q346. Which of the following is true about IPv4 addressing?
A) It supports 128-bit addresses
B) It uses hexadecimal notation
C) It supports over 4 billion unique addresses
D) It is no longer used in modern networks
✅ Correct Answer: C
Q347. Which of the following IP address classes is used for large networks?
A) Class A
B) Class B
C) Class C
D) Class D
✅ Correct Answer: A
Q348. What does the term “broadcast” mean in networking?
A) Sending data to a single device
B) Sending data to all devices in a network segment
C) Sending data to multiple devices based on their MAC address
D) Sending encrypted data to authorized users
✅ Correct Answer: B
Q349. What is the purpose of the DNS (Domain Name System)?
A) To send data over the Internet securely
B) To translate IP addresses to domain names
C) To assign IP addresses dynamically
D) To provide web hosting services
✅ Correct Answer: B
Q350. What type of cable is most commonly used for wired Ethernet connections in local area networks?
A) Fiber optic cable
B) Coaxial cable
C) Twisted pair cable
D) Serial cable
✅ Correct Answer: C
Q351. Which of the following devices is used to filter traffic between different networks?
A) Switch
B) Router
C) Firewall
D) Bridge
✅ Correct Answer: C
Q352. Which protocol is used to send email from a client to a mail server?
A) FTP
B) IMAP
C) SMTP
D) POP3
✅ Correct Answer: C
Q353. What is the purpose of the “ping” command in networking?
A) To encrypt data
B) To check the availability of a network device
C) To assign IP addresses to devices
D) To forward data between networks
✅ Correct Answer: B
Q354. Which of the following best describes a “hub”?
A) A device that forwards data between networks
B) A device that connects multiple devices and broadcasts data to all
C) A device that filters traffic based on MAC addresses
D) A device that encrypts network traffic
✅ Correct Answer: B
Q355. What is the default port number for HTTP?
A) 25
B) 21
C) 80
D) 443
✅ Correct Answer: C
Q356. Which of the following is a valid IPv4 address?
A) 192.256.1.1
B) 256.0.0.0
C) 192.168.0.1
D) 192.0.0.256
✅ Correct Answer: C
Q357. Which of the following commands is used to display the IP configuration in Windows?
A) ipconfig
B) ifconfig
C) show ip
D) netstat
✅ Correct Answer: A
Q358. What does the term “subnet mask” determine?
A) The maximum number of devices in a network
B) The range of IP addresses in a network
C) The MAC address of the network interface
D) The routing path for network traffic
✅ Correct Answer: B
Q359. Which of the following is used for secure, encrypted communication over a network?
A) HTTP
B) HTTPS
C) FTP
D) SNMP
✅ Correct Answer: B
Q360. What is the function of the Application Layer in the OSI model?
A) To provide error detection and correction
B) To manage the physical connection between devices
C) To define protocols for data communication between applications
D) To route data between networks
✅ Correct Answer: C
Q361. What is the purpose of “port scanning” in network security?
A) To measure network performance
B) To discover open ports on a device for potential vulnerabilities
C) To resolve domain names to IP addresses
D) To establish secure connections
✅ Correct Answer: B
Q362. Which of the following protocols is used to assign dynamic IP addresses to devices on a network?
A) DNS
B) DHCP
C) HTTP
D) FTP
✅ Correct Answer: B
Q363. Which of the following is a characteristic of a “Class C” IPv4 address?
A) It supports up to 16 million hosts
B) It has a subnet mask of 255.255.255.0
C) It is used for large enterprise networks
D) It uses 128-bit addressing
✅ Correct Answer: B
Q364. Which of the following is a primary advantage of fiber optic cables over copper cables?
A) Higher bandwidth capacity
B) Lower cost
C) Easier to install
D) Resistance to electromagnetic interference
✅ Correct Answer: A
Q365. What is the primary function of DNS (Domain Name System)?
A) To assign IP addresses to hosts
B) To provide email services
C) To translate domain names to IP addresses
D) To route data between networks
✅ Correct Answer: C
Q366. What does “VPN” stand for in networking?
A) Virtual Protocol Network
B) Virtual Private Network
C) Variable Private Network
D) Verified Public Network
✅ Correct Answer: B
Q367. Which of the following is an example of a “private” IP address?
A) 172.16.254.1
B) 8.8.8.8
C) 192.168.1.1
D) 10.0.0.1
✅ Correct Answer: A
Q368. What is the purpose of the OSI Model?
A) To define the structure of network cables
B) To provide a standard for networking protocols
C) To define IP address assignment methods
D) To ensure secure transmission of data
✅ Correct Answer: B
Q369. Which of the following IP addresses is used for loopback testing on a local machine?
A) 192.168.1.1
B) 127.0.0.1
C) 255.255.255.255
D) 10.0.0.1
✅ Correct Answer: B
Q370. Which of the following is a valid Class A IP address?
A) 192.168.1.1
B) 128.0.0.1
C) 10.0.0.1
D) 172.16.0.1
✅ Correct Answer: C
Q371. Which of the following is used to encrypt communication over a web browser?
A) FTP
B) HTTPS
C) POP3
D) SMTP
✅ Correct Answer: B
Q372. Which layer of the OSI model is responsible for routing and forwarding packets?
A) Application
B) Transport
C) Network
D) Data Link
✅ Correct Answer: C
Q373. What is the default port for HTTPS?
A) 80
B) 21
C) 443
D) 25
✅ Correct Answer: C
Q374. Which of the following is the main purpose of the network layer (Layer 3) in the OSI model?
A) Data encoding
B) Error detection
C) Routing data between devices on different networks
D) Establishing physical connections
✅ Correct Answer: C
Q375. In an Ethernet network, which of the following is used to prevent collisions?
A) IP addresses
B) MAC addresses
C) CSMA/CD protocol
D) Subnet masks
✅ Correct Answer: C
Q376. What does the term “CIDR” stand for?
A) Classless Inter-Domain Routing
B) Classful Internet Domain Routing
C) Classless Internal Domain Routing
D) Central Internet Domain Routing
✅ Correct Answer: A
Q377. What type of IP address is used to communicate with all devices in a network segment?
A) Unicast
B) Anycast
C) Broadcast
D) Multicast
✅ Correct Answer: C
Q378. Which of the following is NOT a valid IP address?
A) 10.0.0.1
B) 192.168.0.256
C) 172.16.254.1
D) 8.8.8.8
✅ Correct Answer: B
Q379. Which layer of the OSI model is responsible for segmenting and reassembling data?
A) Physical
B) Data Link
C) Transport
D) Application
✅ Correct Answer: C
Q380. Which of the following is used to monitor network performance and traffic?
A) Wireshark
B) nslookup
C) ping
D) netstat
✅ Correct Answer: A
Q381. What is the main function of a router?
A) To filter traffic based on MAC addresses
B) To connect different networks and route packets between them
C) To transmit data on the physical medium
D) To assign IP addresses dynamically
✅ Correct Answer: B
Q382. Which of the following is the default subnet mask for a Class C IP address?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
✅ Correct Answer: C
Q383. What is the main function of DNS (Domain Name System)?
A) To assign IP addresses to devices on the network
B) To convert domain names into IP addresses
C) To encrypt communication on the network
D) To control access to network devices
✅ Correct Answer: B
Q384. Which of the following network devices operates at Layer 1 of the OSI model?
A) Router
B) Switch
C) Hub
D) Bridge
✅ Correct Answer: C
Q385. Which of the following is used to send data to a specific group of devices in a network?
A) Unicast
B) Broadcast
C) Multicast
D) Anycast
✅ Correct Answer: C
Q386. Which of the following is true about IPv6 addresses?
A) They are 32 bits long
B) They are written in decimal
C) They are 128 bits long
D) They use CIDR notation exclusively
✅ Correct Answer: C
Q387. What is the main function of a switch in a network?
A) To forward data based on IP addresses
B) To connect multiple networks
C) To forward data based on MAC addresses
D) To route data packets between subnets
✅ Correct Answer: C
Q388. Which of the following network devices operates at Layer 2 of the OSI model?
A) Router
B) Switch
C) Hub
D) Gateway
✅ Correct Answer: B
Q389. Which of the following protocols is used for secure file transfer?
A) FTP
B) TFTP
C) FTPS
D) SMTP
✅ Correct Answer: C
Q390. Which of the following is a private IP address range as defined by RFC 1918?
A) 192.0.2.0 – 192.0.2.255
B) 172.16.0.0 – 172.31.255.255
C) 10.0.0.0 – 10.255.255.255
D) All of the above
✅ Correct Answer: D
Q391. What does the term “LAN” stand for in networking?
A) Large Area Network
B) Local Area Network
C) Long-range Area Network
D) Layered Area Network
✅ Correct Answer: B
Q392. In an IP address, what does the “network portion” of the address refer to?
A) The part that identifies the device within the network
B) The part that identifies the network to which the device belongs
C) The part that identifies the subnet mask
D) The part that identifies the domain name
✅ Correct Answer: B
Q393. What is the primary purpose of NAT (Network Address Translation)?
A) To encrypt data during transmission
B) To assign IP addresses to devices dynamically
C) To map private IP addresses to public IP addresses
D) To route data between different subnets
✅ Correct Answer: C
Q394. Which layer of the OSI model is responsible for error detection and correction in data transmission?
A) Physical Layer
B) Data Link Layer
C) Network Layer
D) Transport Layer
✅ Correct Answer: B
Q395. What is the purpose of the “loopback address” 127.0.0.1?
A) To test the local network connection
B) To send data to all devices in the network
C) To forward packets to remote networks
D) To check the status of the DNS server
✅ Correct Answer: A
Q396. Which of the following routing protocols is classified as an interior gateway protocol (IGP)?
A) BGP
B) OSPF
C) EIGRP
D) Both B and C
✅ Correct Answer: D
Q397. What does “QoS” stand for in networking?
A) Quality of Service
B) Quick on Service
C) Query of Service
D) Quality of Security
✅ Correct Answer: A
Q398. Which of the following is a type of “physical” network topology?
A) Mesh
B) Tree
C) Star
D) All of the above
✅ Correct Answer: D
Q399. Which of the following protocols is used for secure shell access to a remote device?
A) Telnet
B) SSH
C) FTP
D) HTTP
✅ Correct Answer: B
Q400. What is the primary function of the DHCP protocol?
A) To translate domain names into IP addresses
B) To assign IP addresses to devices on a network automatically
C) To provide secure communication for remote users
D) To monitor network performance
✅ Correct Answer: B