Computer Networking Multiple Choice Questions: Test Your Knowledge

Challenge yourself with this set of multiple-choice questions covering key computer networking concepts. Test your understanding and identify areas for further learning.



Multiple Choice Questions on Computer Networking

Instructions

Choose the best answer for each question.

Question 1: Which of these is a standard interface for serial data transmission?

  1. USB
  2. RS232C
  3. Ethernet
  4. IEEE 802.11

Question 2: Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?

  1. Bus
  2. Ring
  3. Mesh
  4. Star

Question 3: Which of the following transmission directions listed is not a legitimate channel?

  1. Simplex
  2. Half-Duplex
  3. Full-Duplex
  4. Double Duplex

Question 4: "Parity bits" are used for which of the following purposes?

  1. Encryption
  2. Compression
  3. Error detection
  4. Flow control

Question 5: What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?

  1. Twisted-pair cable
  2. Optical fiber
  3. Coaxial cable
  4. Wireless

Question 6: A collection of hyperlinked documents on the internet forms the ?

  1. World Wide Web (WWW)
  2. Internet Protocol (IP)
  3. Domain Name System (DNS)
  4. File Transfer Protocol (FTP)

Question 7: The location of a resource on the internet is given by its?

  1. URI (Uniform Resource Identifier)
  2. URL (Uniform Resource Locator)
  3. URN (Uniform Resource Name)
  4. IP Address

Question 8: The term HTTP stands for?

  1. Hypertext Transfer Protocol Secure
  2. Hypertext Transmission Protocol
  3. Hypertext Transfer Protocol
  4. Hypertext Transport Protocol Secure

Question 9: A proxy server is used as a computer?

  1. with external access
  2. with internal access only
  3. for file storage
  4. for database management

Question 10: Which one of the following would breach the integrity of a system?

  1. Strong passwords for all users
  2. Full access rights for all users
  3. Regular security audits
  4. Firewall protection

Question 11: Which software prevents external access to a system?

  1. Firewall
  2. Antivirus
  3. Operating System
  4. Application Software

Question 12: Which one of the following is a valid email address?

  1. [email protected]
  2. someone.example
  3. someone@example
  4. @example.com

Question 13: Which of the following best describes uploading information?

  1. Receiving information from a host computer
  2. Sending information to a host computer
  3. Processing information on a local computer
  4. Storing information on a remote server

Question 14: Which one of the following is the most common internet protocol?

  1. HTTP
  2. FTP
  3. TCP/IP
  4. DNS

Question 15: Software programs that allow you to legally copy files and give them away at no cost are called which of the following?

  1. Shareware
  2. Freeware
  3. Open-source
  4. Public domain

Question 16: The term FTP stands for?

  1. File Transfer Protocol Secure
  2. Fast Transmission Protocol
  3. File Transfer Protocol
  4. File Transmission Protocol Secure

Question 17: At what speed does tele-computed refer?

  1. Bit rate
  2. Byte rate
  3. Baud rate
  4. Packet rate

Question 18: Which one of the following is not a network topology?

  1. Star
  2. Bus
  3. Ring
  4. Peer to Peer

Question 19: The maximum length (in bytes) of an IPv4 datagram is?

  1. 576
  2. 1500
  3. 65535
  4. Unlimited

Question 20: Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?

  1. ICMP is used for data transfer.
  2. A redirect message is used when a router notices that a packet seems to have been routed wrongly.
  3. ICMP is a connection-oriented protocol.
  4. ICMP is used for securing network connections.

Question 21: The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?

  1. 255.255.255.128
  2. 255.255.255.192
  3. 255.255.255.224
  4. 255.255.255.240

Question 22: When the mail server sends mail to other mail servers it becomes ___ ?

  1. SMTP client
  2. SMTP server
  3. POP3 client
  4. POP3 server

Question 23: The length of an IPv6 address is?

  1. 32 bits
  2. 64 bits
  3. 128 bits
  4. 256 bits

Question 24: Consider the following: 1. Twisted pair cables, 2. Microwaves and Satellite Signals, 3. Repeaters, 4. Analog Transmissions, 5. Fiber optics. Which of the following are guided transmission media?

  1. (1) and (3)
  2. (1) and (4)
  3. (1), (3), and (4)
  4. (1), (2), and (5)

Question 25: Which of the following is used to obtain a loopback address?

  1. 127.0.0.1
  2. 192.168.1.1
  3. 0.0.0.0
  4. 255.255.255.255