Computer Networking MCQ | SET – 05
Computer networking refers to the practice of connecting computers and other devices together to facilitate the exchange of data and resources. It enables communication and collaboration between devices, allowing users to share information, access shared resources, and connect to the Internet.
Computer networks can be categorized into different types based on their scale and purpose.
Local Area Networks (LANs) connect devices within a limited geographic area, such as a home, office, or campus. Wide Area Networks (WANs) connect devices over larger geographical distances, often utilizing public or private telecommunication infrastructures.
The Internet, the largest and most well-known network, is a global network of networks that connects millions of devices worldwide.
Here are some multiple-choice questions about Computer Networking MCQ | SET – 05 along with their answers and explanations. Here are 20 Questions for you:
Question 1: Which of the following devices operates at the network layer of the OSI model?
Answer: c) Router
Explanation: Routers operate at the network layer (Layer 3) of the OSI model and are responsible for forwarding data packets between different networks.
Question 2: Which of the following protocols is used for secure communication over the Internet?
Answer: c) SSH
Explanation: SSH (Secure Shell) is a protocol used for secure remote access and secure file transfer over an unsecured network, such as the Internet.
Question 3: Which of the following IP addresses is a private IP address?
Answer: a) 192.168.1.10
Explanation: IP addresses in the range 192.168.0.0 to 192.168.255.255 are reserved for private networks and cannot be routed on the public Internet.
Question 04: What is the purpose of a DNS server?
a) To convert domain names to IP addresses
b) To secure network connections
c) To manage network resources
d) To establish VPN connections
Answer: a) To convert domain names to IP addresses
Explanation: DNS (Domain Name System) servers are responsible for translating human-readable domain names (e.g., www.example.com) into IP addresses that computers can understand.
Question 5: Which of the following wireless standards provides the highest data transfer rates?
Answer: d) 802.11ac
Explanation: 802.11ac is a wireless standard that provides higher data transfer rates and operates on the 5 GHz frequency band.
Question 6: Which network topology requires the most cabling?
Answer: d) Mesh
Explanation: In a mesh network topology, each device is connected to every other device, resulting in a significant amount of cabling required.
Question 7: Which transport protocol guarantees the delivery of data packets?
Answer: a) TCP
Explanation: TCP (Transmission Control Protocol) is a reliable transport protocol that ensures the delivery of data packets by using acknowledgments and retransmissions.
Question 8: Which subnet mask would be used to divide an IP network into 4 subnets?
Answer: d) 255.255.255.224
Explanation: A subnet mask of 255.255.255.224 (or /27 in CIDR notation) allows for the creation of 4 subnets by borrowing 3 bits from the host portion of the IP address.
Question 9: What is the purpose of NAT (Network Address Translation)?
a) To encrypt network traffic
b) To filter network traffic
c) To translate private IP addresses to public IP addresses
d) To authenticate network users
Answer: c) To translate private IP addresses to public IP addresses
Explanation: NAT is used to translate private IP addresses used within a local network to a single public IP address that can be used on the Internet.
Question 10: Which of the following is NOT a type of network topologies?
Answer: d) Loop
Explanation: Loop is not a standard type of network topology. It is important to avoid loops in network topologies to prevent broadcast storms and network instability.
Question 11: What does the acronym “LAN” stand for?
a) Local Access Network
b) Local Area Network
c) Long Area Network
d) Limited Access Network
Answer: b) Local Area Network
Explanation: LAN stands for Local Area Network, which refers to a network that covers a small geographic area, such as a home, office, or building.
Question 12: Which of the following is a reliable protocol used for email communication?
Answer: a) SMTP
Explanation: SMTP (Simple Mail Transfer Protocol) is a protocol used for sending and receiving email messages between mail servers.
Question 13: Which protocol is commonly used for secure web browsing?
Answer: c) HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption to ensure secure communication between web browsers and web servers.
Question 14: Which of the following network devices operates at the Data Link layer of the OSI model?
Answer: c) Switch
Explanation: Switches operate at the Data Link layer (Layer 2) of the OSI model and are used to connect multiple devices within a network, forwarding data based on MAC addresses.
Question 15: Which protocol is used for assigning IP addresses automatically to network devices?
Answer: b) DHCP
Explanation: DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses, subnet masks, and other network configuration parameters automatically to devices on a network.
Question 16: Which of the following is NOT a valid IPv6 address format?
Answer: c) 2001:0db8:85a3::8a2e:0370:7334:9999
Explanation: The “::” notation can only be used once in an IPv6 address to represent consecutive blocks of zeros. Therefore, option c) is not a valid format.
Question 17: Which of the following protocols is used for resolving IP addresses to MAC addresses?
Answer: a) ARP
Explanation: ARP (Address Resolution Protocol) is used to map an IP address to the corresponding MAC address
Question 18: Which of the following protocols operates at the Transport layer of the TCP/IP model?
a) ARP (Address Resolution Protocol)
b) ICMP (Internet Control Message Protocol)
c) TCP (Transmission Control Protocol)
d) IP (Internet Protocol)
Answer: c) TCP (Transmission Control Protocol)
Explanation: The TCP/IP model is a conceptual model used in computer networking that consists of four layers: Network Interface, Internet, Transport, and Application. The Transport layer is responsible for reliable data delivery and includes protocols such as TCP and UDP (User Datagram Protocol).
TCP ensures reliable, connection-oriented communication between hosts, whereas UDP provides connectionless communication. Therefore, TCP operates at the Transport layer of the TCP/IP model.
Question 19: Which of the following network devices operates at the Data Link layer of the OSI model?
Answer: c) Switch
Explanation: The OSI (Open Systems Interconnection) model is a reference model used to understand how different network protocols and devices interact. The Data Link layer is the second layer of the OSI model and is responsible for reliable data transfer over a physical link.
Switches operate at this layer by examining the MAC (Media Access Control) addresses in Ethernet frames to forward data between devices connected to its ports. Routers operate at the Network layer, bridges can operate at both the Data Link and Physical layers, and gateways operate at the Network layer or above.
Question 20: Which of the following IP addresses belong to the private IP address ranges defined by RFC 1918?
Answer: a) 10.0.0.1, b) 172.16.0.1, c) 192.168.0.1
Explanation: RFC 1918 defines three private IP address ranges that are reserved for use within private networks. These ranges are as follows:
– 10.0.0.0 to 10.255.255.255 (10.0.0.0/8)
– 172.16.0.0 to 172.31.255.255 (172.16.0.0/12)
– 192.168.0.0 to 192.168.255.255 (192.168.0.0/16)
IP addresses within these ranges are not routable over the public internet. In the given options, a) 10.0.0.1, b) 172.16.0.1, and c) 192.168.0.1 belong to the private IP address ranges, while d) 203.0.113.1 does not.
In conclusion, computer networking is an essential field that enables the connection and communication between devices, allowing for the exchange of data and resources.
It encompasses the design, implementation, and management of hardware and software components, as well as protocols that govern data transmission.
Computer networks come in various types and sizes, from local area networks to wide area networks and the global Internet.
Please note that these questions cover some Computer Networking concepts in computer science. I hope the explanations help clarify the concepts for you. If you have any specific topics or areas you’d like to explore further, feel free to ask!