Network MCQs (101-200) IP Address
Q101. What is the number of usable hosts in a /29 network?
A) 6
B) 8
C) 14
D) 30
✅ Correct Answer: A
Q102. Which subnet mask corresponds to a /27 prefix?
A) 255.255.255.224
B) 255.255.255.240
C) 255.255.255.248
D) 255.255.255.192
✅ Correct Answer: A
Q103. How many subnets are created when borrowing 3 bits from the host portion?
A) 4
B) 6
C) 8
D) 16
✅ Correct Answer: C
Q104. Which of the following is a valid host IP in the subnet 172.16.8.0/21?
A) 172.16.7.255
B) 172.16.8.255
C) 172.16.15.255
D) 172.16.16.1
✅ Correct Answer: B
Q105. What is the first valid host address in 192.168.5.64/26?
A) 192.168.5.63
B) 192.168.5.65
C) 192.168.5.66
D) 192.168.5.62
✅ Correct Answer: B
Q106. The broadcast address for 10.1.4.0/23 is:
A) 10.1.4.255
B) 10.1.5.255
C) 10.1.3.255
D) 10.1.6.255
✅ Correct Answer: B
Q107. The network address for IP 172.31.77.210/20 is:
A) 172.31.64.0
B) 172.31.72.0
C) 172.31.80.0
D) 172.31.96.0
✅ Correct Answer: A
Q108. What is the CIDR notation for subnet mask 255.255.255.128?
A) /24
B) /25
C) /26
D) /27
✅ Correct Answer: B
Q109. How many usable hosts does a /23 network support?
A) 254
B) 510
C) 512
D) 1022
✅ Correct Answer: B
Q110. Which of the following masks provides 16 subnets in a Class C network?
A) 255.255.255.0
B) 255.255.255.128
C) 255.255.255.240
D) 255.255.255.192
✅ Correct Answer: C
Q111. What is the subnet mask for a /18 prefix?
A) 255.255.192.0
B) 255.255.224.0
C) 255.255.240.0
D) 255.255.128.0
✅ Correct Answer: A
Q112. Which of the following networks is not a valid private IP range?
A) 10.0.0.0/8
B) 172.16.0.0/12
C) 192.168.0.0/16
D) 11.0.0.0/8
✅ Correct Answer: D
Q113. How many bits are borrowed in a /26 network?
A) 2
B) 4
C) 6
D) 8
✅ Correct Answer: B
Q114. What is the default gateway for 192.168.1.0/25 network?
A) 192.168.1.0
B) 192.168.1.1
C) 192.168.1.127
D) 192.168.1.128
✅ Correct Answer: B
Q115. Which IP address belongs to the subnet 192.168.2.128/25?
A) 192.168.2.64
B) 192.168.2.100
C) 192.168.2.200
D) 192.168.2.255
✅ Correct Answer: C
Q116. The subnet mask for dividing a Class B network into 256 subnets is:
A) 255.255.255.0
B) 255.255.0.0
C) 255.255.255.255
D) 255.255.255.128
✅ Correct Answer: A
Q117. How many usable hosts are in a /30 network?
A) 2
B) 4
C) 6
D) 8
✅ Correct Answer: A
Q118. Which subnet mask would you use to create 4 equal subnets in 192.168.1.0?
A) 255.255.255.0
B) 255.255.255.192
C) 255.255.255.128
D) 255.255.255.224
✅ Correct Answer: C
Q119. A subnet with mask 255.255.255.248 provides how many usable IPs?
A) 6
B) 8
C) 14
D) 30
✅ Correct Answer: A
Q120. What is the last valid host of 172.20.16.0/20?
A) 172.20.16.254
B) 172.20.31.254
C) 172.20.32.255
D) 172.20.15.255
✅ Correct Answer: B
Q121. Which IP address is a valid broadcast address?
A) 192.168.10.255
B) 172.16.0.0
C) 10.1.1.0
D) 8.8.8.8
✅ Correct Answer: A
Q122. Which address is a valid network ID for a /27 subnet?
A) 10.10.10.30
B) 10.10.10.32
C) 10.10.10.34
D) 10.10.10.33
✅ Correct Answer: B
Q123. What is the number of subnets created when a /24 is subnetted into /28s?
A) 8
B) 12
C) 16
D) 32
✅ Correct Answer: C
Q124. The subnet mask 255.255.255.252 corresponds to how many usable hosts?
A) 1
B) 2
C) 4
D) 8
✅ Correct Answer: B
Q125. Which IP range is part of APIPA (Automatic Private IP Addressing)?
A) 192.168.x.x
B) 172.16.x.x
C) 169.254.x.x
D) 10.x.x.x
✅ Correct Answer: C
Q126. Which of the following is a distance-vector routing protocol?
A) OSPF
B) RIP
C) IS-IS
D) BGP
✅ Correct Answer: B
Q127. What is the administrative distance of OSPF?
A) 90
B) 100
C) 110
D) 120
✅ Correct Answer: C
Q128. Which routing protocol uses Dijkstra’s shortest path first (SPF) algorithm?
A) RIP
B) OSPF
C) BGP
D) EIGRP
✅ Correct Answer: B
Q129. Which of the following is a hybrid routing protocol?
A) RIP
B) OSPF
C) BGP
D) EIGRP
✅ Correct Answer: D
Q130. Which command is used to verify OSPF neighbor relationships on a Cisco router?
A) show ip ospf route
B) show ip ospf neighbors
C) show ospf database
D) show ospf interface
✅ Correct Answer: B
Q131. Which layer 3 protocol is used for inter-domain routing?
A) RIP
B) OSPF
C) BGP
D) EIGRP
✅ Correct Answer: C
Q132. What is the maximum hop count for RIP?
A) 10
B) 15
C) 16
D) 255
✅ Correct Answer: B
Q133. EIGRP uses which metric by default?
A) Hop count
B) Bandwidth and delay
C) Cost
D) Reliability only
✅ Correct Answer: B
Q134. OSPF uses which protocol number in IP headers?
A) 88
B) 89
C) 90
D) 91
✅ Correct Answer: B
Q135. BGP uses which transport protocol?
A) UDP
B) ICMP
C) TCP
D) SCTP
✅ Correct Answer: C
Q136. The default administrative distance of a static route is:
A) 0
B) 1
C) 5
D) 10
✅ Correct Answer: B
Q137. Which protocol prevents routing loops in distance-vector routing?
A) Split horizon
B) Dijkstra
C) SPF
D) Flooding
✅ Correct Answer: A
Q138. Which routing protocol is link-state?
A) RIP
B) IGRP
C) OSPF
D) BGP
✅ Correct Answer: C
Q139. What is the backbone area in OSPF always numbered as?
A) Area 0
B) Area 1
C) Area 10
D) Area 255
✅ Correct Answer: A
Q140. Which of the following commands enables OSPF on Cisco routers?
A) router ospf [process-id]
B) enable ospf
C) ospf on
D) configure ospf
✅ Correct Answer: A
Q141. The function of STP (Spanning Tree Protocol) is to:
A) Increase link speed
B) Prevent broadcast storms
C) Manage IP routing
D) Encrypt VLAN traffic
✅ Correct Answer: B
Q142. Which protocol is used to bundle multiple physical links into one logical link?
A) STP
B) LACP
C) VTP
D) CDP
✅ Correct Answer: B
Q143. VLANs are configured at which OSI layer?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
✅ Correct Answer: B
Q144. The default VLAN for all switch ports is:
A) VLAN 0
B) VLAN 1
C) VLAN 10
D) VLAN 100
✅ Correct Answer: B
Q145. What is the range of normal VLAN IDs?
A) 1–100
B) 1–1001
C) 2–1002
D) 1–4096
✅ Correct Answer: B
Q146. The IEEE standard for VLAN tagging is:
A) 802.1Q
B) 802.3u
C) 802.11n
D) 802.5
✅ Correct Answer: A
Q147. Which of these protocols advertises VLAN information between switches?
A) CDP
B) LLDP
C) VTP
D) STP
✅ Correct Answer: C
Q148. The default STP priority value for a Cisco switch is:
A) 0
B) 32768
C) 4096
D) 65535
✅ Correct Answer: B
Q149. Which device is responsible for inter-VLAN routing?
A) Switch
B) Router
C) Access point
D) Hub
✅ Correct Answer: B
Q150. Which port type carries traffic for multiple VLANs?
A) Access port
B) Trunk port
C) Routed port
D) Management port
✅ Correct Answer: B
Q151. Which of the following is a WAN protocol?
A) Ethernet
B) Frame Relay
C) Token Ring
D) FDDI
✅ Correct Answer: B
Q152. Which layer does PPP operate at?
A) Data Link
B) Network
C) Transport
D) Application
✅ Correct Answer: A
Q153. Which of the following provides dynamic bandwidth allocation in Frame Relay?
A) CIR
B) DE
C) FECN
D) BECN
✅ Correct Answer: A
Q154. MPLS stands for:
A) Multi-Protocol Label Switching
B) Multiple Path Link Switching
C) Multi-Packet Layer System
D) Multi-Point Line Service
✅ Correct Answer: A
Q155. Which WAN technology uses labels for forwarding decisions?
A) MPLS
B) ATM
C) Frame Relay
D) PPP
✅ Correct Answer: A
Q156. PPPoE stands for:
A) Point-to-Point over Ethernet
B) Peer-to-Peer over Ethernet
C) Packet Path over Ethernet
D) Port-to-Port over Ethernet
✅ Correct Answer: A
Q157. Which encapsulation type is used by Frame Relay?
A) HDLC
B) LAPF
C) LAPB
D) SLIP
✅ Correct Answer: B
Q158. Which of the following is a connection-oriented WAN protocol?
A) Frame Relay
B) ATM
C) PPP
D) MPLS
✅ Correct Answer: B
Q159. The LCP (Link Control Protocol) is part of which WAN technology?
A) PPP
B) MPLS
C) ATM
D) Frame Relay
✅ Correct Answer: A
Q160. Which protocol is used to establish VPN tunnels over the Internet?
A) HTTP
B) GRE
C) FTP
D) DNS
✅ Correct Answer: B
Q161. IPSec operates at which layer of the OSI model?
A) Transport
B) Network
C) Data Link
D) Application
✅ Correct Answer: B
Q162. Which of the following provides secure site-to-site VPN connections?
A) PPTP
B) L2TP
C) IPSec
D) GRE
✅ Correct Answer: C
Q163. Which VPN protocol uses SSL for encryption?
A) L2TP
B) IPSec
C) PPTP
D) OpenVPN
✅ Correct Answer: D
Q164. What port does PPTP use by default?
A) 80
B) 1723
C) 500
D) 443
✅ Correct Answer: B
Q165. Which of these protocols uses port 1701?
A) PPTP
B) L2TP
C) IPSec
D) GRE
✅ Correct Answer: B
Q166. The purpose of GRE tunneling is to:
A) Encrypt packets
B) Encapsulate packets for transport
C) Compress packets
D) Filter packets
✅ Correct Answer: B
Q167. Which of the following uses both IPsec and L2TP together for VPNs?
A) PPTP
B) SSL VPN
C) L2TP/IPSec
D) GRE
✅ Correct Answer: C
Q168. What is the default port for IKE (Internet Key Exchange)?
A) 22
B) 50
C) 500
D) 1701
✅ Correct Answer: C
Q169. Which IPsec mode encrypts both the header and the payload?
A) Transport mode
B) Tunnel mode
C) L2TP mode
D) GRE mode
✅ Correct Answer: B
Q170. MPLS labels are assigned by which component?
A) Router
B) LSR (Label Switch Router)
C) Switch
D) Hub
✅ Correct Answer: B
Q171. Which of the following is a VPN tunneling protocol?
A) HTTPS
B) L2TP
C) SMTP
D) SNMP
✅ Correct Answer: B
Q172. Which PPP feature is used for authentication?
A) LCP
B) NCP
C) PAP/CHAP
D) HDLC
✅ Correct Answer: C
Q173. The default encapsulation for serial interfaces on Cisco routers is:
A) HDLC
B) PPP
C) Frame Relay
D) MPLS
✅ Correct Answer: A
Q174. Which WAN technology provides fixed-size cells for transmission?
A) Frame Relay
B) ATM
C) MPLS
D) PPP
✅ Correct Answer: B
Q175. The Committed Information Rate (CIR) in Frame Relay defines:
A) The maximum burst rate
B) The guaranteed bandwidth
C) The peak data rate
D) The encapsulation type
✅ Correct Answer: B
Q176. Which of the following is a network security protocol used to provide confidentiality and integrity over IP networks?
A) SSH
B) IPSec
C) HTTP
D) SNMP
✅ Correct Answer: B
Q177. Which port number does SSH use?
A) 20
B) 21
C) 22
D) 23
✅ Correct Answer: C
Q178. Which security protocol replaced SSL?
A) TLS
B) IPSec
C) HTTPS
D) PPTP
✅ Correct Answer: A
Q179. Which of these is an example of symmetric encryption?
A) RSA
B) Diffie-Hellman
C) AES
D) ECC
✅ Correct Answer: C
Q180. What does IDS stand for?
A) Internet Defense System
B) Intrusion Detection System
C) Internal Data Security
D) Integrated Defense Setup
✅ Correct Answer: B
Q181. What is the main function of a firewall?
A) Encrypt traffic
B) Filter incoming and outgoing traffic
C) Assign IP addresses
D) Monitor link utilization
✅ Correct Answer: B
Q182. Which protocol is used for secure web browsing?
A) HTTP
B) HTTPS
C) FTP
D) TELNET
✅ Correct Answer: B
Q183. Which of these is a type of DoS attack?
A) Smurf attack
B) Port scanning
C) Phishing
D) Keylogging
✅ Correct Answer: A
Q184. Which type of malware demands payment from the user?
A) Virus
B) Worm
C) Ransomware
D) Spyware
✅ Correct Answer: C
Q185. WPA3 uses which encryption algorithm?
A) TKIP
B) RC4
C) AES
D) DES
✅ Correct Answer: C
Q186. The function of an Intrusion Prevention System (IPS) is to:
A) Detect and block malicious activity
B) Monitor only network traffic
C) Encrypt data in transit
D) Manage user authentication
✅ Correct Answer: A
Q187. Which of the following operates in promiscuous mode to detect network intrusions?
A) Firewall
B) IDS
C) Router
D) Proxy
✅ Correct Answer: B
Q188. WPA2 uses which encryption protocol?
A) WEP
B) AES
C) RC4
D) TKIP
✅ Correct Answer: B
Q189. Which wireless frequency offers longer range but slower speed?
A) 2.4 GHz
B) 5 GHz
C) 6 GHz
D) 60 GHz
✅ Correct Answer: A
Q190. Which IEEE standard defines Wi-Fi?
A) 802.11
B) 802.3
C) 802.15
D) 802.16
✅ Correct Answer: A
Q191. Which Wi-Fi standard supports speeds up to 600 Mbps?
A) 802.11a
B) 802.11b
C) 802.11n
D) 802.11g
✅ Correct Answer: C
Q192. The technology used for short-range wireless communication between devices is:
A) Wi-Fi
B) ZigBee
C) Bluetooth
D) NFC
✅ Correct Answer: C
Q193. Which of the following is not a wireless security protocol?
A) WPA
B) WEP
C) WAP
D) WPA2
✅ Correct Answer: C
Q194. Which device acts as a bridge between wireless and wired networks?
A) Hub
B) Router
C) Access Point
D) Switch
✅ Correct Answer: C
Q195. What is the default channel width for 802.11n?
A) 10 MHz
B) 20 MHz
C) 40 MHz
D) 80 MHz
✅ Correct Answer: B
Q196. Which wireless standard introduced MU-MIMO technology?
A) 802.11ac
B) 802.11n
C) 802.11g
D) 802.11a
✅ Correct Answer: A
Q197. What is the maximum data rate of 802.11ac?
A) 300 Mbps
B) 1 Gbps
C) 6.9 Gbps
D) 10 Gbps
✅ Correct Answer: C
Q198. Which Wi-Fi standard operates only in the 5 GHz band?
A) 802.11n
B) 802.11ac
C) 802.11b
D) 802.11g
✅ Correct Answer: B
Q199. The process of hiding SSID in a Wi-Fi network is done for:
A) Security by obscurity
B) Increasing signal range
C) Reducing bandwidth
D) Improving speed
✅ Correct Answer: A
Q200. Which security protocol uses a four-way handshake for authentication?
A) WEP
B) WPA2
C) WPA
D) SSL
✅ Correct Answer: B