MCQs on Networking & Internet

[Set - 1]

1. What is the primary function of a router in a network?

A) Assign IP addresses to devices
B) Direct traffic between networks
C) Encrypt sensitive network data
D) Monitor bandwidth usage

Correct Answer: B) Direct traffic between networks
Explanation: A router connects different networks and determines the best path for data packets to travel, ensuring efficient communication.

2. What does the term "subnet mask" signify in networking?

A) Define broadcast domains
B) Identify network and host parts of an IP address
C) Specify the type of encryption used
D) Measure the latency in data transfer

Correct Answer: B) Identify network and host parts of an IP address
Explanation: A subnet mask divides an IP address into the network and host portions, helping to determine which subnet a device belongs to.

3. How is data transmitted in a circuit-switched network compared to a packet-switched network?

A) Continuous and dedicated in circuit-switched; divided into packets in packet-switched
B) Randomized in circuit-switched; sequential in packet-switched
C) Encrypted in circuit-switched; unencrypted in packet-switched
D) Asynchronous in circuit-switched; synchronous in packet-switched

Correct Answer: A) Continuous and dedicated in circuit-switched; divided into packets in packet-switched
Explanation: Circuit-switched networks establish a dedicated connection for the duration of a communication session, while packet-switched networks break data into packets sent independently.

4. What is the primary purpose of a firewall in a computer network?

A) Enhance data transmission speed
B) Protect the network from unauthorized access
C) Assign unique IP addresses to devices
D) Manage bandwidth for connected devices

Correct Answer: B) Protect the network from unauthorized access
Explanation: Firewalls monitor and control incoming and outgoing traffic based on security rules, preventing unauthorized access to the network.

5. Which protocol is responsible for assigning IP addresses dynamically to devices in a network?

A) DNS
B) ICMP
C) ARP
D) DHCP

Correct Answer: D) DHCP
Explanation: The Dynamic Host Configuration Protocol (DHCP) assigns IP addresses dynamically to devices, simplifying network configuration.

6. What is the difference between IPv4 and IPv6 addressing?

A) IPv6 provides a larger address space than IPv4
B) IPv4 uses fewer protocols than IPv6
C) IPv6 encrypts data by default, unlike IPv4
D) IPv4 supports DNS better than IPv6

Correct Answer: A) IPv6 provides a larger address space than IPv4
Explanation: IPv4 uses 32-bit addressing, supporting around 4 billion unique addresses, while IPv6 uses 128-bit addressing, allowing for a virtually unlimited number of addresses.

7. How does a VPN (Virtual Private Network) enhance security in a network?

A) Assign unique IP addresses to users
B) Monitors bandwidth for secure connections
C) Encrypts data and masks IP addresses
D) Prevents malware from spreading

Correct Answer: C) Encrypts data and masks IP addresses
Explanation: VPNs encrypt transmitted data and hide the user’s IP address, ensuring privacy and security on public and private networks.

8. What is the significance of DNS (Domain Name System) in the Internet?

A) Maps IP addresses to domain names
B) Encrypts data for secure communication
C) Optimizes network speed for websites
D) Prevents unauthorized access to servers

Correct Answer: A) Maps IP addresses to domain names
Explanation: DNS translates human-readable domain names (like www.example.com) into IP addresses, enabling devices to locate and communicate with websites.

9. Which OSI layer is responsible for end-to-end delivery of data?

A) Application layer
B) Network layer
C) Transport layer
D) Data link layer

Correct Answer: C) Transport layer
Explanation: The transport layer ensures reliable end-to-end data delivery, managing error checking, retransmissions, and flow control.

10. What does the term "latency" refer to in network communication?

A) The speed of data transfer over a network
B) The time it takes for data to travel
C) The size of packets sent in a network
D) The encryption level of transmitted data

Correct Answer: B) The time it takes for data to travel
Explanation: Latency refers to the delay between sending and receiving data in a network, often measured in milliseconds.

11. How does a proxy server work in a network?

A) Directly connects devices to the Internet
B) Acts as an intermediary for requests
C) Encrypts all transmitted data automatically
D) Assigns static IP addresses to clients

Correct Answer: B) Acts as an intermediary for requests
Explanation: A proxy server handles client requests to access resources, improving privacy, security, and caching for better performance.

12. What is the role of a MAC address in a network?

A) Resolve conflicts in IP address assignment
B) Encrypt transmitted data for security
C) Improve data transfer speeds on Wi-Fi
D) Assign unique physical addresses to devices

Correct Answer: D) Assign unique physical addresses to devices
Explanation: MAC (Media Access Control) addresses are unique identifiers for devices on a local network, used for communication within a LAN.

13. What is the purpose of the TCP three-way handshake process?

A) Encrypt data before transmission
B) Assign dynamic IP addresses
C) Establish a reliable connection
D) Ensure the quickest routing path

Correct Answer: C) Establish a reliable connection
Explanation: The TCP three-way handshake synchronizes communication between devices, ensuring a reliable connection before data transfer begins.

14. What is the main function of a switch in a network?

A) Direct packets to appropriate devices
B) Encrypt transmitted network data
C) Assign IP addresses to devices
D) Optimize bandwidth for all users

 

Correct Answer: A) Direct packets to appropriate devices
Explanation: Switches manage data flow by forwarding packets only to the intended recipient devices in a network.

15. How does SSL/TLS ensure secure communication over the Internet?

A) By encrypting data and verifying identities
B) By assigning unique IP addresses to users
C) By monitoring traffic for potential threats
D) By preventing malware distribution

Correct Answer: A) By encrypting data and verifying identities
Explanation: SSL/TLS encrypts data and authenticates the server and client, ensuring secure communication over the Internet.

16. What is the difference between unicast, multicast, and broadcast communication?

A) Unicast sends to many; multicast to all; broadcast to one
B) Unicast sends to all; multicast to many; broadcast to none
C) Unicast sends to one; multicast to many; broadcast to all
D) Unicast sends to all; multicast to one; broadcast to many

Correct Answer: C) Unicast sends to one; multicast to many; broadcast to all
Explanation: Unicast targets a single recipient, multicast sends to a group of specific devices, and broadcast sends data to all devices in a network.

17. What is the purpose of ARP (Address Resolution Protocol) in networking?

A) Encrypt data before transmission
B) Resolve IP addresses to MAC addresses
C) Assign unique IP addresses to devices
D) Manage bandwidth allocation

Correct Answer: B) Resolve IP addresses to MAC addresses
Explanation: ARP translates an IP address into a MAC address, enabling devices on the same network to communicate.

18. How does NAT (Network Address Translation) work in a network?

A) Converts public IPs to private IPs
B) Encrypts all data transmitted across networks
C) Monitors bandwidth usage for clients
D) Assigns dynamic IP addresses to all devices

Correct Answer: A) Converts public IPs to private IPs
Explanation: NAT allows multiple devices on a private network to share a single public IP address for Internet access, improving security and efficiency.

19. What is the difference between HTTP and HTTPS protocols?

A) HTTPS encrypts data; HTTP does not
B) HTTPS uses IPv6; HTTP uses IPv4
C) HTTPS speeds up data transfer; HTTP slows it
D) HTTPS manages domains; HTTP resolves IPs

Correct Answer: A) HTTPS encrypts data; HTTP does not
Explanation: HTTPS adds a layer of security to HTTP by encrypting data using SSL/TLS, ensuring safer communication.

20. How does the OSI model differ from the TCP/IP model?

A) OSI has seven layers; TCP/IP has fewer layers
B) OSI encrypts data; TCP/IP does not
C) OSI defines protocols; TCP/IP uses hardware
D) OSI is used for routing; TCP/IP is for encryption

Correct Answer: A) OSI has seven layers; TCP/IP has fewer layers
Explanation: The OSI model is a conceptual framework with seven layers, while the TCP/IP model is practical with fewer layers, focused on Internet communication.

Share this with your friends

Solve More MCQs on Networking & Internet

    •   Back
    • MCQs Computer Fundamentals
    • MCQs Computer Abbreviations
    • MCQs Computer Hardware
    • MCQs Computer Software
    • MCQs Operating Systems
    • MCQs Networking and Internet
    • MCQs Programming Basics
Show All
Lorem Ipsum is simply dumy text of the printing typesetting industry lorem ipsum.

Subscribe to our Newsletter

Subscribe to our Newsletter

& stay ahead of your competitors!

You have been successfully Subscribed! Ops! Something went wrong, please try again.
Subscribe Form

* Subscribe to our email newsletter to get the latest posts delivered right to your email.

© MCQs 4 Exams. All rights reserved.