Network MCQs (301-400)

Q301. Which of the following routing protocols is considered a link-state protocol?
A) RIP
B) EIGRP
C) OSPF
D) BGP
Correct Answer: C

Q302. In the context of OSPF, what does the acronym DR stand for?
A) Designated Router
B) Data Router
C) Dynamic Route
D) Default Router
Correct Answer: A

Q303. What is the default administrative distance for OSPF?
A) 110
B) 120
C) 90
D) 1
Correct Answer: A

Q304. What is the purpose of a “routing loop”?
A) To efficiently share network load
B) To direct traffic to the most optimal path
C) To prevent data from being sent to unreachable destinations
D) To cause packets to circulate between routers endlessly
Correct Answer: D

Q305. Which of the following protocols does not use a metric to determine the best path?
A) OSPF
B) RIP
C) BGP
D) EIGRP
Correct Answer: C

Q306. In the context of routing, what does the term “metric” refer to?
A) A fixed time for packet delivery
B) A measurement used to determine the best route
C) The IP address of the next hop
D) The number of routers in a network
Correct Answer: B

Q307. Which type of routing protocol is BGP?
A) Distance-vector
B) Link-state
C) Path-vector
D) Hybrid
Correct Answer: C

Q308. Which of the following statements is true about RIP?
A) It is a link-state protocol.
B) It supports variable-length subnet masks (VLSM).
C) It uses hop count as its metric.
D) It is used for large enterprise networks.
Correct Answer: C

Q309. What is the primary purpose of a “stub network” in routing?
A) To handle dynamic routing in remote locations
B) To avoid routing loops
C) To connect two routers in a network
D) To provide a simplified routing path for smaller networks
Correct Answer: D

Q310. In an IPv6 address, how many bits are used for the network prefix?
A) 32
B) 64
C) 128
D) 48
Correct Answer: B

Q311. Which of the following is a feature of the DHCP protocol?
A) Assigns static IP addresses
B) Automatically assigns IP addresses to hosts
C) Encrypts IP traffic
D) Resolves domain names to IP addresses
Correct Answer: B

Q312. What type of address is used in IPv6 for communication between nodes on the same link?
A) Unicast
B) Anycast
C) Multicast
D) Link-local
Correct Answer: D

Q313. What does the term “NAT overload” refer to?
A) Multiple IP addresses mapping to a single public address
B) Filtering of unauthorized traffic
C) Multiple routers forwarding traffic for the same IP
D) Automatic IP address assignment in a private network
Correct Answer: A

Q314. Which of the following protocols is used to obtain IP address information automatically?
A) DNS
B) DHCP
C) FTP
D) POP3
Correct Answer: B

Q315. In network security, which of the following attacks involves an attacker intercepting data between two parties?
A) Man-in-the-Middle
B) Denial-of-Service
C) SQL Injection
D) Phishing
Correct Answer: A

Q316. Which of the following is true regarding TLS (Transport Layer Security)?
A) It is used to encrypt HTTP traffic.
B) It is an older protocol that has been replaced by SSL.
C) It is only used in VPNs.
D) It cannot be used to secure email communication.
Correct Answer: A

Q317. What does the “SSL handshake” primarily accomplish?
A) Authenticate the server and the client
B) Encrypt the application data
C) Resolve domain names to IP addresses
D) Establish the route for data to travel
Correct Answer: A

Q318. Which of the following is a function of a VPN (Virtual Private Network)?
A) Allowing multiple users to share the same IP address
B) Securing data by encrypting traffic over public networks
C) Optimizing the speed of a network connection
D) Assigning IP addresses to a local area network
Correct Answer: B

Q319. In the context of IP security, what does IPSec stand for?
A) Internet Protocol Security
B) Internet Protocol Session
C) Integrated Protection Security
D) Internet Private Secure
Correct Answer: A

Q320. Which of the following is a type of denial-of-service (DoS) attack?
A) DNS Spoofing
B) TCP SYN Flood
C) Phishing
D) SQL Injection
Correct Answer: B

Q321. What is the purpose of the “Access Control List” (ACL) in networking?
A) To encrypt data packets
B) To assign IP addresses dynamically
C) To control inbound and outbound traffic
D) To perform load balancing
Correct Answer: C

Q322. Which of the following network devices operates at Layer 2 of the OSI model?
A) Switch
B) Router
C) Firewall
D) Hub
Correct Answer: A

Q323. Which security protocol is used to secure the communication between a browser and a web server?
A) SSL
B) IPsec
C) SSH
D) SNMP
Correct Answer: A

Q324. Which of the following is used to prevent unauthorized access to a network by verifying the identity of devices?
A) Firewalls
B) VPNs
C) Authentication protocols
D) Encryption
Correct Answer: C

Q325. Which device is typically used to segment a network into smaller broadcast domains?
A) Router
B) Switch
C) Hub
D) Bridge
Correct Answer: A

Q326. What does the term “port forwarding” refer to in networking?
A) Sending data packets from one IP address to another
B) Redirecting network traffic to specific devices based on port numbers
C) Blocking network traffic based on IP addresses
D) Assigning IP addresses dynamically
Correct Answer: B

Q327. In wireless networking, what does SSID stand for?
A) Secure Session Identification
B) Secure Service Internet Domain
C) Service Set Identifier
D) Session Set Identifier
Correct Answer: C

Q328. Which of the following is an advantage of using a proxy server?
A) It provides encryption for all network traffic.
B) It hides the internal network’s IP addresses.
C) It accelerates data transmission by increasing bandwidth.
D) It automatically assigns IP addresses.
Correct Answer: B

Q329. What is the function of the “NTP” (Network Time Protocol)?
A) To resolve domain names into IP addresses
B) To synchronize clocks of networked devices
C) To encrypt communication between devices
D) To monitor network traffic
Correct Answer: B

Q330. Which of the following is the purpose of a VLAN?
A) To provide physical network isolation
B) To group devices into the same broadcast domain regardless of physical location
C) To secure the network traffic from external threats
D) To assign IP addresses to devices dynamically
Correct Answer: B

Q331. What does the term “ping of death” refer to?
A) A network denial-of-service attack using a large ping packet
B) A technique to measure network performance
C) A type of error packet generated by a router
D) A diagnostic command used to test DNS servers
Correct Answer: A

Q332. Which type of cable is commonly used for high-speed network connections?
A) Fiber optic
B) Coaxial
C) Twisted pair
D) Serial cable
Correct Answer: A

Q333. What is the function of a load balancer in a network?
A) To monitor network traffic
B) To distribute traffic evenly across multiple servers
C) To encrypt network data
D) To assign dynamic IP addresses
Correct Answer: B

Q334. Which of the following is a major disadvantage of a hub?
A) It can only connect to a single device
B) It causes broadcast traffic to be sent to all devices
C) It increases network speed
D) It operates at the Network layer
Correct Answer: B

Q335. What is the primary role of the ARP (Address Resolution Protocol) in networking?
A) Resolve domain names to IP addresses
B) Resolve IP addresses to MAC addresses
C) Encrypt network traffic
D) Assign IP addresses dynamically
Correct Answer: B

Q336. Which of the following is used to assign IP addresses dynamically?
A) DNS
B) DHCP
C) HTTP
D) FTP
Correct Answer: B

Q337. What is the most common type of network used in homes and small offices?
A) LAN
B) WAN
C) MAN
D) VPN
Correct Answer: A

Q338. Which device is used to connect two different networks?
A) Switch
B) Hub
C) Router
D) Bridge
Correct Answer: C

Q339. What does the term “bandwidth” refer to in networking?
A) The physical size of a network cable
B) The amount of data transmitted over a network in a given period
C) The number of devices connected to a network
D) The time it takes for a packet to travel from source to destination
Correct Answer: B

Q340. Which of the following is a characteristic of IPv6?
A) It uses 32-bit addresses
B) It uses the same address format as IPv4
C) It allows for a larger address space than IPv4
D) It does not support routing
Correct Answer: C

Q341. Which of the following is the main function of the transport layer in the OSI model?
A) Routing data between networks
B) Encrypting data
C) Ensuring reliable data transfer between devices
D) Formatting data for the application layer
Correct Answer: C

Q342. Which of the following is true about MAC addresses?
A) They are used to route data between different networks
B) They are globally unique identifiers for network interfaces
C) They are assigned by the operating system
D) They are only used in IPv6 networks
Correct Answer: B

Q343. In a switched network, which device forwards frames based on MAC addresses?
A) Router
B) Switch
C) Hub
D) Bridge
Correct Answer: B

Q344. Which protocol is used to translate human-readable domain names into IP addresses?
A) SMTP
B) DNS
C) DHCP
D) FTP
Correct Answer: B

Q345. What is the maximum number of devices that can be connected to a Class C IP address subnet with a 255.255.255.0 subnet mask?
A) 254
B) 256
C) 128
D) 62
Correct Answer: A

Q346. Which of the following is true about IPv4 addressing?
A) It supports 128-bit addresses
B) It uses hexadecimal notation
C) It supports over 4 billion unique addresses
D) It is no longer used in modern networks
Correct Answer: C

Q347. Which of the following IP address classes is used for large networks?
A) Class A
B) Class B
C) Class C
D) Class D
Correct Answer: A

Q348. What does the term “broadcast” mean in networking?
A) Sending data to a single device
B) Sending data to all devices in a network segment
C) Sending data to multiple devices based on their MAC address
D) Sending encrypted data to authorized users
Correct Answer: B

Q349. What is the purpose of the DNS (Domain Name System)?
A) To send data over the Internet securely
B) To translate IP addresses to domain names
C) To assign IP addresses dynamically
D) To provide web hosting services
Correct Answer: B

Q350. What type of cable is most commonly used for wired Ethernet connections in local area networks?
A) Fiber optic cable
B) Coaxial cable
C) Twisted pair cable
D) Serial cable
Correct Answer: C

Q351. Which of the following devices is used to filter traffic between different networks?
A) Switch
B) Router
C) Firewall
D) Bridge
Correct Answer: C

Q352. Which protocol is used to send email from a client to a mail server?
A) FTP
B) IMAP
C) SMTP
D) POP3
Correct Answer: C

Q353. What is the purpose of the “ping” command in networking?
A) To encrypt data
B) To check the availability of a network device
C) To assign IP addresses to devices
D) To forward data between networks
Correct Answer: B

Q354. Which of the following best describes a “hub”?
A) A device that forwards data between networks
B) A device that connects multiple devices and broadcasts data to all
C) A device that filters traffic based on MAC addresses
D) A device that encrypts network traffic
Correct Answer: B

Q355. What is the default port number for HTTP?
A) 25
B) 21
C) 80
D) 443
Correct Answer: C

Q356. Which of the following is a valid IPv4 address?
A) 192.256.1.1
B) 256.0.0.0
C) 192.168.0.1
D) 192.0.0.256
Correct Answer: C

Q357. Which of the following commands is used to display the IP configuration in Windows?
A) ipconfig
B) ifconfig
C) show ip
D) netstat
Correct Answer: A

Q358. What does the term “subnet mask” determine?
A) The maximum number of devices in a network
B) The range of IP addresses in a network
C) The MAC address of the network interface
D) The routing path for network traffic
Correct Answer: B

Q359. Which of the following is used for secure, encrypted communication over a network?
A) HTTP
B) HTTPS
C) FTP
D) SNMP
Correct Answer: B

Q360. What is the function of the Application Layer in the OSI model?
A) To provide error detection and correction
B) To manage the physical connection between devices
C) To define protocols for data communication between applications
D) To route data between networks
Correct Answer: C

Q361. What is the purpose of “port scanning” in network security?
A) To measure network performance
B) To discover open ports on a device for potential vulnerabilities
C) To resolve domain names to IP addresses
D) To establish secure connections
Correct Answer: B

Q362. Which of the following protocols is used to assign dynamic IP addresses to devices on a network?
A) DNS
B) DHCP
C) HTTP
D) FTP
Correct Answer: B

Q363. Which of the following is a characteristic of a “Class C” IPv4 address?
A) It supports up to 16 million hosts
B) It has a subnet mask of 255.255.255.0
C) It is used for large enterprise networks
D) It uses 128-bit addressing
Correct Answer: B

Q364. Which of the following is a primary advantage of fiber optic cables over copper cables?
A) Higher bandwidth capacity
B) Lower cost
C) Easier to install
D) Resistance to electromagnetic interference
Correct Answer: A

Q365. What is the primary function of DNS (Domain Name System)?
A) To assign IP addresses to hosts
B) To provide email services
C) To translate domain names to IP addresses
D) To route data between networks
Correct Answer: C

Q366. What does “VPN” stand for in networking?
A) Virtual Protocol Network
B) Virtual Private Network
C) Variable Private Network
D) Verified Public Network
Correct Answer: B

Q367. Which of the following is an example of a “private” IP address?
A) 172.16.254.1
B) 8.8.8.8
C) 192.168.1.1
D) 10.0.0.1
Correct Answer: A

Q368. What is the purpose of the OSI Model?
A) To define the structure of network cables
B) To provide a standard for networking protocols
C) To define IP address assignment methods
D) To ensure secure transmission of data
Correct Answer: B

Q369. Which of the following IP addresses is used for loopback testing on a local machine?
A) 192.168.1.1
B) 127.0.0.1
C) 255.255.255.255
D) 10.0.0.1
Correct Answer: B

Q370. Which of the following is a valid Class A IP address?
A) 192.168.1.1
B) 128.0.0.1
C) 10.0.0.1
D) 172.16.0.1
Correct Answer: C

Q371. Which of the following is used to encrypt communication over a web browser?
A) FTP
B) HTTPS
C) POP3
D) SMTP
Correct Answer: B

Q372. Which layer of the OSI model is responsible for routing and forwarding packets?
A) Application
B) Transport
C) Network
D) Data Link
Correct Answer: C

Q373. What is the default port for HTTPS?
A) 80
B) 21
C) 443
D) 25
Correct Answer: C

Q374. Which of the following is the main purpose of the network layer (Layer 3) in the OSI model?
A) Data encoding
B) Error detection
C) Routing data between devices on different networks
D) Establishing physical connections
Correct Answer: C

Q375. In an Ethernet network, which of the following is used to prevent collisions?
A) IP addresses
B) MAC addresses
C) CSMA/CD protocol
D) Subnet masks
Correct Answer: C

Q376. What does the term “CIDR” stand for?
A) Classless Inter-Domain Routing
B) Classful Internet Domain Routing
C) Classless Internal Domain Routing
D) Central Internet Domain Routing
Correct Answer: A

Q377. What type of IP address is used to communicate with all devices in a network segment?
A) Unicast
B) Anycast
C) Broadcast
D) Multicast
Correct Answer: C

Q378. Which of the following is NOT a valid IP address?
A) 10.0.0.1
B) 192.168.0.256
C) 172.16.254.1
D) 8.8.8.8
Correct Answer: B

Q379. Which layer of the OSI model is responsible for segmenting and reassembling data?
A) Physical
B) Data Link
C) Transport
D) Application
Correct Answer: C

Q380. Which of the following is used to monitor network performance and traffic?
A) Wireshark
B) nslookup
C) ping
D) netstat
Correct Answer: A

Q381. What is the main function of a router?
A) To filter traffic based on MAC addresses
B) To connect different networks and route packets between them
C) To transmit data on the physical medium
D) To assign IP addresses dynamically
Correct Answer: B

Q382. Which of the following is the default subnet mask for a Class C IP address?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Correct Answer: C

Q383. What is the main function of DNS (Domain Name System)?
A) To assign IP addresses to devices on the network
B) To convert domain names into IP addresses
C) To encrypt communication on the network
D) To control access to network devices
Correct Answer: B

Q384. Which of the following network devices operates at Layer 1 of the OSI model?
A) Router
B) Switch
C) Hub
D) Bridge
Correct Answer: C

Q385. Which of the following is used to send data to a specific group of devices in a network?
A) Unicast
B) Broadcast
C) Multicast
D) Anycast
Correct Answer: C

Q386. Which of the following is true about IPv6 addresses?
A) They are 32 bits long
B) They are written in decimal
C) They are 128 bits long
D) They use CIDR notation exclusively
Correct Answer: C

Q387. What is the main function of a switch in a network?
A) To forward data based on IP addresses
B) To connect multiple networks
C) To forward data based on MAC addresses
D) To route data packets between subnets
Correct Answer: C

Q388. Which of the following network devices operates at Layer 2 of the OSI model?
A) Router
B) Switch
C) Hub
D) Gateway
Correct Answer: B

Q389. Which of the following protocols is used for secure file transfer?
A) FTP
B) TFTP
C) FTPS
D) SMTP
Correct Answer: C

Q390. Which of the following is a private IP address range as defined by RFC 1918?
A) 192.0.2.0 – 192.0.2.255
B) 172.16.0.0 – 172.31.255.255
C) 10.0.0.0 – 10.255.255.255
D) All of the above
Correct Answer: D

Q391. What does the term “LAN” stand for in networking?
A) Large Area Network
B) Local Area Network
C) Long-range Area Network
D) Layered Area Network
Correct Answer: B

Q392. In an IP address, what does the “network portion” of the address refer to?
A) The part that identifies the device within the network
B) The part that identifies the network to which the device belongs
C) The part that identifies the subnet mask
D) The part that identifies the domain name
Correct Answer: B

Q393. What is the primary purpose of NAT (Network Address Translation)?
A) To encrypt data during transmission
B) To assign IP addresses to devices dynamically
C) To map private IP addresses to public IP addresses
D) To route data between different subnets
Correct Answer: C

Q394. Which layer of the OSI model is responsible for error detection and correction in data transmission?
A) Physical Layer
B) Data Link Layer
C) Network Layer
D) Transport Layer
Correct Answer: B

Q395. What is the purpose of the “loopback address” 127.0.0.1?
A) To test the local network connection
B) To send data to all devices in the network
C) To forward packets to remote networks
D) To check the status of the DNS server
Correct Answer: A

Q396. Which of the following routing protocols is classified as an interior gateway protocol (IGP)?
A) BGP
B) OSPF
C) EIGRP
D) Both B and C
Correct Answer: D

Q397. What does “QoS” stand for in networking?
A) Quality of Service
B) Quick on Service
C) Query of Service
D) Quality of Security
Correct Answer: A

Q398. Which of the following is a type of “physical” network topology?
A) Mesh
B) Tree
C) Star
D) All of the above
Correct Answer: D

Q399. Which of the following protocols is used for secure shell access to a remote device?
A) Telnet
B) SSH
C) FTP
D) HTTP
Correct Answer: B

Q400. What is the primary function of the DHCP protocol?
A) To translate domain names into IP addresses
B) To assign IP addresses to devices on a network automatically
C) To provide secure communication for remote users
D) To monitor network performance
Correct Answer: B

Leave a Comment

Your email address will not be published. Required fields are marked *

You cannot copy content of this page

Scroll to Top