Network MCQs (201-300)

Q201. What does SDN stand for?
A) Software-Defined Networking
B) Software-Driven Nodes
C) System Data Network
D) Static Device Network
Correct Answer: A

Q202. Which protocol is primarily used between SDN controllers and switches?
A) OSPF
B) BGP
C) OpenFlow
D) RIP
Correct Answer: C

Q203. Which of the following is a characteristic of SDN architecture?
A) Centralized control plane
B) Hardware-based configuration
C) Static routing
D) Distributed management
Correct Answer: A

Q204. Which layer of SDN architecture communicates directly with network devices?
A) Application layer
B) Control layer
C) Infrastructure layer
D) Service layer
Correct Answer: C

Q205. The main advantage of SDN is:
A) Manual configuration
B) Vendor lock-in
C) Network programmability
D) Hardware redundancy
Correct Answer: C

Q206. Which of the following is an SDN controller platform?
A) Cisco DNA Center
B) Wireshark
C) SNMP
D) OpenVPN
Correct Answer: A

Q207. The Southbound API in SDN is responsible for:
A) Connecting applications to the controller
B) Communicating between controller and switches
C) Defining user policies
D) Configuring VLANs
Correct Answer: B

Q208. Which of the following is a Northbound API in SDN?
A) REST API
B) SNMP
C) OSPF
D) ICMP
Correct Answer: A

Q209. Which of the following is a key SDN advantage for data centers?
A) Inflexibility
B) Static IP assignment
C) Dynamic resource allocation
D) Limited scalability
Correct Answer: C

Q210. Virtual Network Functions (VNFs) are part of which networking concept?
A) SDN
B) NFV
C) VPN
D) VLAN
Correct Answer: B

Q211. What does NFV stand for?
A) Network Function Virtualization
B) Network Framework Validation
C) Network File Versioning
D) Node Forwarding Value
Correct Answer: A

Q212. Which of these is a virtualization platform?
A) Hyper-V
B) OSPF
C) TCP/IP
D) BGP
Correct Answer: A

Q213. Which hypervisor type runs directly on hardware?
A) Type 1
B) Type 2
C) Type 3
D) Type X
Correct Answer: A

Q214. VMware ESXi is an example of which hypervisor type?
A) Type 1
B) Type 2
C) Bare-metal OS
D) Virtual OS
Correct Answer: A

Q215. Which network model does cloud computing primarily rely on?
A) Client-server
B) Peer-to-peer
C) Distributed
D) Star
Correct Answer: C

Q216. Which of the following is a deployment model of cloud computing?
A) Centralized
B) Hybrid
C) Ring
D) Mesh
Correct Answer: B

Q217. What is the main function of a virtual switch?
A) Connect virtual machines
B) Route packets
C) Encrypt traffic
D) Assign IPs
Correct Answer: A

Q218. Which protocol is commonly used in cloud networks for virtual LANs?
A) VxLAN
B) RIP
C) OSPF
D) STP
Correct Answer: A

Q219. What does VxLAN stand for?
A) Virtual Extensible LAN
B) Virtual Exchange LAN
C) Virtual Expansion Layer
D) Variable External LAN
Correct Answer: A

Q220. In cloud networking, the term “multi-tenancy” means:
A) One user per network
B) Multiple users share resources
C) Separate physical hardware for each user
D) Limited scalability
Correct Answer: B

Q221. Which of the following is a cloud service model?
A) IaaS
B) DNS
C) ARP
D) RIP
Correct Answer: A

Q222. Which service model provides virtual machines to customers?
A) SaaS
B) IaaS
C) PaaS
D) DaaS
Correct Answer: B

Q223. AWS EC2 is an example of:
A) SaaS
B) IaaS
C) PaaS
D) FaaS
Correct Answer: B

Q224. Which of the following is a cloud storage service?
A) Google Drive
B) Wireshark
C) BGP
D) DNS
Correct Answer: A

Q225. The primary protocol used for managing cloud network APIs is:
A) REST
B) SMTP
C) SNMP
D) FTP
Correct Answer: A


Q226. Which protocol is used for automating network configuration tasks?
A) SNMP
B) SSH
C) NETCONF
D) FTP
Correct Answer: C

Q227. Which scripting language is commonly used for network automation?
A) Python
B) JavaScript
C) Ruby
D) Perl
Correct Answer: A

Q228. Ansible is used for:
A) Network performance monitoring
B) Network configuration management
C) Traffic analysis
D) Network traffic encryption
Correct Answer: B

Q229. What does the term “Infrastructure as Code” (IaC) mean in the context of network automation?
A) Hardware provisioning via scripts
B) Network devices running code-based software
C) Automating physical cabling
D) Managing network devices using code
Correct Answer: D

Q230. Which of these is a popular network automation tool?
A) Wireshark
B) Terraform
C) Wi-Fi Analyzer
D) Cisco Packet Tracer
Correct Answer: B

Q231. Which protocol is commonly used for network monitoring and management?
A) HTTP
B) SNMP
C) FTP
D) TFTP
Correct Answer: B

Q232. Which version of SNMP introduced improved security features?
A) SNMPv1
B) SNMPv2c
C) SNMPv3
D) SNMPv4
Correct Answer: C

Q233. What does the “show interfaces” command display on a Cisco router?
A) Routing table
B) Device configuration
C) Interface status and statistics
D) Running processes
Correct Answer: C

Q234. Which command is used to display the ARP table on a router?
A) show ip arp
B) show ip route
C) show arp
D) show interfaces
Correct Answer: A

Q235. What is the function of the command “ping” in network troubleshooting?
A) Displays routing information
B) Tests network device connectivity
C) Encrypts data for secure transmission
D) Configures the firewall
Correct Answer: B

Q236. What is the default port for the HTTP protocol?
A) 21
B) 80
C) 443
D) 23
Correct Answer: B

Q237. The term “latency” in network performance refers to:
A) Packet loss
B) Network congestion
C) Delay in data transmission
D) Bandwidth usage
Correct Answer: C

Q238. What is the purpose of a network load balancer?
A) To optimize network throughput
B) To assign IP addresses dynamically
C) To distribute traffic across multiple servers
D) To block unauthorized traffic
Correct Answer: C

Q239. Which tool is used to measure network bandwidth?
A) NetFlow
B) Ping
C) iperf
D) Wireshark
Correct Answer: C

Q240. The primary function of a syslog server is to:
A) Monitor traffic patterns
B) Store network device logs
C) Control network access
D) Analyze packet contents
Correct Answer: B

Q241. What type of device is a network probe typically used for?
A) Routing
B) Security monitoring
C) Network analysis
D) Traffic shaping
Correct Answer: C

Q242. Which of the following is a tool for automating network tests and deployments?
A) Ansible
B) SolarWinds
C) NetFlow
D) Wireshark
Correct Answer: A

Q243. The “show ip route” command on a Cisco router is used to:
A) Display routing table
B) Display interface configuration
C) Display ARP table
D) Display network performance metrics
Correct Answer: A

Q244. In network monitoring, “NetFlow” is used to:
A) Encrypt network traffic
B) Monitor and analyze traffic flows
C) Automate configuration
D) Generate firewall rules
Correct Answer: B

Q245. Which of these is an example of a network performance metric?
A) MTU
B) Round-trip time
C) DNS resolution
D) IP address
Correct Answer: B

Q246. What is the purpose of the “traceroute” command?
A) Display the routing table
B) Identify device IP addresses
C) Trace the path data takes to reach a destination
D) Configure router interfaces
Correct Answer: C

Q247. Which network automation tool is used for configuration management?
A) Ansible
B) GNS3
C) Wireshark
D) BGP
Correct Answer: A

Q248. Which command is used to test connectivity to an IP address from a computer?
A) telnet
B) traceroute
C) ping
D) nslookup
Correct Answer: C

Q249. In network automation, which of these tools is known for automating cloud infrastructure?
A) Wireshark
B) Terraform
C) GNS3
D) Nagios
Correct Answer: B

Q250. Which of the following is commonly used to simulate network traffic for performance testing?
A) iperf
B) nmap
C) SSH
D) tcpdump
Correct Answer: A

Q251. Which of the following tools is used for analyzing network traffic?
A) Wireshark
B) NetFlow
C) SolarWinds
D) NTP
Correct Answer: A

Q252. What does the “netstat” command display on a networked device?
A) IP address configuration
B) Network statistics
C) Network device logs
D) Active network connections
Correct Answer: D

Q253. In the OSI model, which layer is responsible for routing packets between networks?
A) Data Link
B) Network
C) Transport
D) Application
Correct Answer: B

Q254. Which protocol is primarily used for DNS resolution?
A) SMTP
B) ICMP
C) DNS
D) FTP
Correct Answer: C

Q255. Which tool would you use to measure the round-trip time of packets to a remote host?
A) traceroute
B) ping
C) nslookup
D) iperf
Correct Answer: B

Q256. The “ARP” protocol is used to:
A) Convert domain names to IP addresses
B) Resolve IP addresses to MAC addresses
C) Provide secure communications over IP
D) Determine route hops
Correct Answer: B

Q257. Which command is used to test connectivity between a source and destination by analyzing intermediate hops?
A) ping
B) traceroute
C) nslookup
D) arp
Correct Answer: B

Q258. What is the purpose of a “default gateway” in networking?
A) To provide a route to the local network
B) To route traffic to external networks
C) To filter inbound traffic
D) To provide dynamic IP addressing
Correct Answer: B

Q259. Which tool is used for visualizing the path of packets over a network?
A) ping
B) traceroute
C) iperf
D) tcpdump
Correct Answer: B

Q260. A high “ping” time could indicate which of the following?
A) Network congestion
B) Unused network bandwidth
C) Low-quality network cables
D) Low CPU usage
Correct Answer: A

Q261. What is the primary use of “tcpdump” in network analysis?
A) Simulate traffic
B) Encrypt network traffic
C) Capture and analyze packets
D) Monitor application performance
Correct Answer: C

Q262. Which protocol does “nslookup” use to resolve domain names?
A) DNS
B) HTTP
C) FTP
D) ICMP
Correct Answer: A

Q263. What does the “show ip interface brief” command display on a Cisco router?
A) Active IP routes
B) Interface status and IP addresses
C) ARP table
D) VLAN information
Correct Answer: B

Q264. A network administrator is troubleshooting a slow connection. Which of the following could be a potential cause of high latency?
A) High bandwidth usage
B) Low CPU utilization
C) Proper routing configuration
D) Low DNS resolution time
Correct Answer: A

Q265. What is the purpose of “bandwidth throttling”?
A) To limit the number of devices in a network
B) To reduce network congestion
C) To allocate bandwidth evenly to all users
D) To improve security by filtering traffic
Correct Answer: B

Q266. A router is used to:
A) Forward traffic within a single local network
B) Connect devices within the same network
C) Forward traffic between different networks
D) Monitor network traffic
Correct Answer: C

Q267. Which tool is used to capture detailed network traffic for analysis and troubleshooting?
A) Ping
B) Wireshark
C) NetFlow
D) nslookup
Correct Answer: B

Q268. What is the primary function of QoS (Quality of Service) in networking?
A) Encrypt data
B) Monitor network traffic
C) Prioritize certain types of traffic
D) Automatically detect network failures
Correct Answer: C

Q269. Which of the following commands would be used to reset a Cisco router’s routing table?
A) clear ip route
B) ip route reset
C) show ip route
D) reset route table
Correct Answer: A

Q270. What does the “icmp” protocol primarily do?
A) Resolves domain names to IP addresses
B) Provides error reporting and diagnostic functions
C) Encrypts data packets
D) Handles email communication
Correct Answer: B

Q271. Which layer of the OSI model is responsible for end-to-end error recovery and flow control?
A) Physical
B) Transport
C) Network
D) Data Link
Correct Answer: B

Q272. What is a common reason for packet loss in a network?
A) Low CPU usage
B) Congested network links
C) High bandwidth availability
D) Properly configured routing
Correct Answer: B

Q273. Which protocol is used by a DNS server to resolve domain names?
A) ICMP
B) SMTP
C) DNS
D) HTTP
Correct Answer: C

Q274. A switch operates primarily at which layer of the OSI model?
A) Layer 1 (Physical)
B) Layer 2 (Data Link)
C) Layer 3 (Network)
D) Layer 4 (Transport)
Correct Answer: B

Q275. In network troubleshooting, which of the following would be a reason to use the “ipconfig” command?
A) To display the routing table
B) To check network interface configuration
C) To simulate network traffic
D) To view DNS records
Correct Answer: B

Q276. Which of these tools is used for scanning and identifying devices on a network?
A) NetFlow
B) Nmap
C) SNMP
D) iperf
Correct Answer: B

Q277. What is the default TTL (Time To Live) value for ICMP packets?
A) 32
B) 64
C) 128
D) 256
Correct Answer: B

Q278. Which of these could indicate a potential issue with a network cable?
A) Low bandwidth usage
B) High network latency
C) High CPU usage
D) Low ping response times
Correct Answer: B

Q279. What is the first step in the OSI model for troubleshooting a network issue?
A) Check the physical layer for hardware failures
B) Test the transport layer for flow control
C) Inspect the application layer for configuration issues
D) Verify IP addresses
Correct Answer: A

Q280. What does the “show running-config” command on a Cisco router display?
A) The router’s ARP table
B) The current configuration file
C) The routing table
D) The interface statistics
Correct Answer: B

Q281. Which command is used to display the current routing table on a Cisco router?
A) show ip route
B) show route
C) show interfaces
D) show arp
Correct Answer: A

Q282. What does “load balancing” in networking typically refer to?
A) Ensuring fair bandwidth distribution across devices
B) Distributing traffic across multiple paths or servers
C) Assigning IP addresses to clients
D) Securing the network
Correct Answer: B

Q283. Which of the following commands helps detect network configuration issues in Linux?
A) ifconfig
B) ip route
C) traceroute
D) ping
Correct Answer: A

Q284. Which protocol does “traceroute” use to trace the network path?
A) ICMP
B) TCP
C) UDP
D) HTTP
Correct Answer: A

Q285. In network optimization, what does “packet shaping” do?
A) It encrypts network traffic
B) It prioritizes certain types of traffic
C) It filters malicious packets
D) It reduces packet loss
Correct Answer: B

Q286. What is the primary purpose of the “nslookup” command?
A) To display routing information
B) To resolve domain names to IP addresses
C) To configure network interfaces
D) To monitor network performance
Correct Answer: B

Q287. Which device is used to connect multiple segments of a network and manage traffic between them?
A) Router
B) Switch
C) Hub
D) Bridge
Correct Answer: A

Q288. Which of the following is commonly used to test if a port is open on a device?
A) Ping
B) Nmap
C) iperf
D) nslookup
Correct Answer: B

Q289. In network troubleshooting, what does “jitter” refer to?
A) Network congestion
B) Variability in packet delay
C) Low bandwidth availability
D) High error rates
Correct Answer: B

Q290. Which of the following tools is primarily used for network vulnerability scanning?
A) Wireshark
B) Nessus
C) iperf
D) Nmap
Correct Answer: B

Q291. What is the primary role of a firewall in network security?
A) Encrypt data packets
B) Block unauthorized network access
C) Route traffic between networks
D) Monitor DNS traffic
Correct Answer: B

Q292. What is the purpose of the “show ip arp” command on a Cisco router?
A) Display routing information
B) Display the ARP table
C) Display network statistics
D) Display IP interface status
Correct Answer: B

Q293. What does the term “half-duplex” refer to in networking?
A) Simultaneous bidirectional communication
B) One-way communication at a time
C) Multi-device communication
D) Traffic is encrypted
Correct Answer: B

Q294. Which of the following is a key principle of network performance optimization?
A) High latency
B) High bandwidth usage
C) Minimizing congestion and delay
D) Increased traffic prioritization
Correct Answer: C

Q295. What is the most common use case for VLANs (Virtual Local Area Networks)?
A) To increase network speed
B) To segregate network traffic logically
C) To assign IP addresses dynamically
D) To connect two different networks
Correct Answer: B

Q296. In IPv6, what is the function of the address type “Link-local”?
A) Used for communication across different networks
B) Used only within a local network segment
C) Used for assigning public IP addresses
D) Used for network-to-network routing
Correct Answer: B

Q297. Which of the following is an advantage of using NAT (Network Address Translation)?
A) Simplifies traffic encryption
B) Improves security by masking internal IP addresses
C) Increases the size of the IP address pool
D) Provides more accurate routing information
Correct Answer: B

Q298. A network administrator notices that several packets are being discarded due to collisions. Which of the following is a likely cause?
A) Congested network link
B) Duplex mismatch between devices
C) Incorrect DNS configuration
D) Misconfigured IP addresses
Correct Answer: B

Q299. What does the term “spanning tree” refer to in network configuration?
A) A mechanism for selecting the fastest path between switches
B) A way to secure devices on a network
C) A protocol for detecting and preventing loops in Ethernet networks
D) A method for encrypting network traffic
Correct Answer: C

Q300. Which of the following is NOT a valid type of IP address for IPv6?
A) Unicast
B) Broadcast
C) Multicast
D) Anycast
Correct Answer: B

 

Leave a Comment

Your email address will not be published. Required fields are marked *

You cannot copy content of this page

Scroll to Top