[go: up one dir, main page]

0% found this document useful (0 votes)
52 views29 pages

Networking &data Communication Mcqs

The document contains 100 multiple-choice questions (MCQs) related to network and data communication in computer science, along with their answers. Topics covered include network topologies, protocols, IP addressing, and networking devices. Each question tests knowledge on fundamental concepts in networking and data communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views29 pages

Networking &data Communication Mcqs

The document contains 100 multiple-choice questions (MCQs) related to network and data communication in computer science, along with their answers. Topics covered include network topologies, protocols, IP addressing, and networking devices. Each question tests knowledge on fundamental concepts in networking and data communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Sure, here are 100 multiple-choice questions (MCQs) with answers related to network and data

communication in computer science:

1. Which of the following is not a network topology?

A) Star

B) Ring

C) Mesh

D) Parallel

Answer: D) Parallel

2. Which protocol is used for email communication?

A) SMTP

B) FTP

C) HTTP

D) TCP

Answer: A) SMTP

3. What is the function of a router in a network?

A) Connects different networks

B) Connects devices within the same network

C) Manages data flow within a network

D) Filters data packets

Answer: A) Connects different networks

4. Which device is used to connect multiple computers in a LAN?

A) Hub
B) Switch

C) Router

D) Modem

Answer: B) Switch

5. What is the purpose of DNS in networking?

A) Encrypt data packets

B) Convert domain names to IP addresses

C) Manage network traffic

D) Ensure secure communication

Answer: B) Convert domain names to IP addresses

6. Which of the following is a valid IPv4 address?

A) 192.168.0.256

B) 300.200.100.50

C) 10.20.30.40

D) 400.500.600.700

Answer: C) 10.20.30.40

7. Which layer of the OSI model is responsible for routing?

A) Physical layer

B) Data link layer

C) Network layer

D) Transport layer

Answer: C) Network layer


8. Which protocol is used for secure communication over the internet?

A) HTTP

B) FTP

C) TCP

D) HTTPS

Answer: D) HTTPS

9. What is the purpose of a firewall in a network?

A) Prevent unauthorized access

B) Connect devices

C) Manage network traffic

D) Convert data packets

Answer: A) Prevent unauthorized access

10. What is the maximum transmission speed of a standard Ethernet connection?

A) 10 Mbps

B) 100 Mbps

C) 1 Gbps

D) 10 Gbps

Answer: C) 1 Gbps

11. Which of the following is a wireless communication technology?

A) Ethernet

B) Bluetooth
C) Fiber optics

D) Coaxial cable

Answer: B) Bluetooth

12. What is the purpose of NAT (Network Address Translation)?

A) Encrypt data packets

B) Convert IP addresses to domain names

C) Map private IP addresses to public IP addresses

D) Manage network traffic

Answer: C) Map private IP addresses to public IP addresses

13. Which of the following is not a type of network cable?

A) Coaxial cable

B) Fiber optic cable

C) Twisted pair cable

D) Parallel cable

Answer: D) Parallel cable

14. What is the function of ARP (Address Resolution Protocol)?

A) Convert IP addresses to MAC addresses

B) Convert domain names to IP addresses

C) Manage network traffic

D) Encrypt data packets

Answer: A) Convert IP addresses to MAC addresses


15. Which of the following is a valid MAC address?

A) 192.168.1.1

B) 00:1A:2B:3C:4D:5E

C) www.example.com

D) 255.255.255.0

Answer: B) 00:1A:2B:3C:4D:5E

16. Which protocol is used for transferring files over the internet?

A) HTTP

B) FTP

C) SMTP

D) TCP

Answer: B) FTP

17. What is the purpose of ICMP (Internet Control Message Protocol)?

A) Convert IP addresses to domain names

B) Manage network traffic

C) Test connectivity between devices

D) Encrypt data packets

Answer: C) Test connectivity between devices

18. Which device is used to amplify network signals?

A) Modem

B) Router

C) Repeater
D) Switch

Answer: C) Repeater

19. What is the purpose of QoS (Quality of Service) in networking?

A) Manage network traffic

B) Encrypt data packets

C) Convert IP addresses to domain names

D) Ensure secure communication

Answer: A) Manage network traffic

20. Which of the following is a private IP address range?

A) 10.0.0.0 - 10.255.255.255

B) 172.16.0.0 - 172.31.255.255

C) 192.168.0.0 - 192.168.255.255

D) All of the above

Answer: D) All of the above

21. Which protocol is used for real-time voice and video communication over the internet?

A) HTTP

B) FTP

C) SIP

D) TCP

Answer: C) SIP

22. What is the purpose of VLAN (Virtual Local Area Network)?


A) Connect devices within the same network

B) Manage network traffic

C) Encrypt data packets

D) Divide a single physical network into multiple logical networks

Answer: D) Divide a single physical network into multiple logical networks

23. Which of the following is a valid IPv6 address?

A) 192.168.1.1

B) 2001:0db8:85a3:0000:0000:8a2e:0370:7334

C) www.example.com

D) 255.255.255.0

Answer: B) 2001:0db8:85a3:0000:0000:8a2e:0370:7334

24. What is the purpose of a proxy server?

A) Prevent unauthorized access

B) Manage network traffic

C) Encrypt data packets

D) Convert IP addresses to domain names

Answer: B) Manage network traffic

25. Which of the following is a characteristic of a bus network topology?

A) High fault tolerance

B) Requires a central hub

C) Expensive to install

D) Difficult to expand
Answer: A) High fault tolerance

26. Which protocol is used for web browsing?

A) HTTP

B) FTP

C) SMTP

D) TCP

Answer: A) HTTP

27. What is the purpose of SSL/TLS in networking?

A) Manage network traffic

B) Ensure secure communication

C) Convert IP addresses to domain names

D) Test connectivity between devices

Answer: B) Ensure secure communication

28. Which of the

following is a valid subnet mask?

A) 255.255.255.256

B) 255.255.255.0

C) 192.168.1.1

D) 10.0.0.0

Answer: B) 255.255.255.0
29. What is the purpose of a gateway in networking?

A) Connects different networks

B) Connects devices within the same network

C) Manages data flow within a network

D) Filters data packets

Answer: A) Connects different networks

30. Which of the following is a wireless security protocol?

A) WEP

B) SSL

C) HTTPS

D) AES

Answer: A) WEP

31. What is the purpose of a modem in networking?

A) Connects different networks

B) Converts digital signals to analog signals

C) Manages data flow within a network

D) Filters data packets

Answer: B) Converts digital signals to analog signals

32. Which of the following is a valid IPv4 subnet?

A) 192.168.1.256/24

B) 10.20.30.40/32

C) 172.16.0.0/16
D) 300.200.100.50/8

Answer: C) 172.16.0.0/16

33. What is the purpose of a DHCP server in networking?

A) Encrypt data packets

B) Convert IP addresses to domain names

C) Manage network traffic

D) Assign IP addresses to devices

Answer: D) Assign IP addresses to devices

34. Which of the following is a valid DNS record type?

A) FTP

B) HTTP

C) A

D) TCP

Answer: C) A

35. What is the purpose of a WAP (Wireless Access Point) in networking?

A) Connects different networks

B) Connects devices within the same network

C) Converts digital signals to analog signals

D) Provides wireless connectivity to devices

Answer: D) Provides wireless connectivity to devices

36. Which of the following is a characteristic of a star network topology?


A) High fault tolerance

B) Requires a central hub

C) Difficult to troubleshoot

D) Limited scalability

Answer: B) Requires a central hub

37. What is the purpose of a MAC address?

A) Identify a device on a network

B) Convert IP addresses to domain names

C) Manage network traffic

D) Encrypt data packets

Answer: A) Identify a device on a network

38. Which protocol is used for remotely accessing servers?

A) FTP

B) SSH

C) SMTP

D) HTTP

Answer: B) SSH

39. What is the purpose of a hub in networking?

A) Connects different networks

B) Connects devices within the same network

C) Manages data flow within a network

D) Filters data packets


Answer: B) Connects devices within the same network

40. Which of the following is a valid IPv6 subnet?

A) 2001:0db8:85a3:0000:0000:8a2e:0370:7334/64

B) 192.168.1.1/24

C) 10.0.0.0/8

D) 172.16.0.0/16

Answer: A) 2001:0db8:85a3:0000:0000:8a2e:0370:7334/64

41. What is the purpose of NAT traversal?

A) Encrypt data packets

B) Convert IP addresses to domain names

C) Map private IP addresses to public IP addresses

D) Manage network traffic

Answer: C) Map private IP addresses to public IP addresses

42. Which of the following is a valid DNS server?

A) 10.0.0.1

B) 127.0.0.1

C) 192.168.1.256

D) 300.200.100.50

Answer: A) 10.0.0.1

43. What is the purpose of a repeater in networking?

A) Connects different networks


B) Connects devices within the same network

C) Amplifies network signals

D) Filters data packets

Answer: C) Amplifies network signals

44. Which protocol is used for transferring hypertext documents over the internet?

A) HTTP

B) FTP

C) SMTP

D) TCP

Answer: A) HTTP

45. What is the purpose of a subnet mask?

A) Identify a device on a network

B) Convert IP addresses to domain names

C) Manage network traffic

D) Define the network and host portions of an IP address

Answer: D) Define the network and host portions of an IP address

46. Which of the following is a characteristic of a mesh network topology?

A) Requires a central hub

B) High fault tolerance

C) Limited scalability

D) Difficult to troubleshoot

Answer: B) High fault tolerance


47. What is the purpose of a proxy ARP?

A) Convert IP addresses to MAC addresses

B) Convert domain names to IP addresses

C) Manage network traffic

D) Test connectivity between devices

Answer: A) Convert IP addresses to MAC addresses

48. Which protocol is used for remote terminal access?

A) HTTP

B) FTP

C) SSH

D) TCP

Answer: C) SSH

49. What is the purpose of a default gateway in networking?

A) Connects different networks

B) Connects devices within the same network

C) Manages data flow within a network

D) Provides a path for outgoing traffic

Answer: D) Provides a path for outgoing traffic

50. Which of the following is a wireless networking standard?

A) Ethernet

B) WiMAX
C) Token Ring

D) SONET

Answer: B) WiMAX

51. What is the purpose of a DNS server?

A) Convert IP addresses to domain names

B) Manage network traffic

C) Encrypt data packets

D) Test connectivity between devices

Answer: A) Convert IP addresses to domain names

52. Which protocol is used for secure file transfer?

A) HTTP

B) FTPS

C) SMTP

D) TCP

Answer: B) FTPS

53. What is the purpose of a VLAN trunk?

A) Connects different networks

B) Connects devices within the same network

C) Provides wireless connectivity to devices

D) Allows multiple VLANs to traverse a single link

Answer: D) Allows multiple VLANs to traverse a single link


54. Which of the following is a valid IPv4 subnet?

A) 192.168.1.1/24

B) 2001:0db8:85a3:0000:0000:8a2e:0370:7334/64

C) 10.0.0.0/8

D) 172.16.0.0/16

Answer: A) 192.168.1.1/24

55. What is the purpose of a gateway in networking?

A) Connects different networks

B) Connects devices within the same network

C) Manages data flow within a network

D) Provides a path for outgoing traffic

Answer: A) Connects different networks

56. Which protocol is used for email retrieval?

A) SMTP

B) POP3

C) IMAP

D) HTTP

Answer: B) POP3

57. What is the purpose of a DHCP relay agent?

A) Assign IP addresses to devices


B) Encrypt data packets

C) Manage network traffic

D) Forward DHCP messages between subnets

Answer: D) Forward DHCP messages between subnets

58. Which of the following is a characteristic of a ring network topology?

A) Requires a central hub

B) Easy to troubleshoot

C) Limited scalability

D) High fault tolerance

Answer: D) High fault tolerance

59. What is the purpose of a DNS cache?

A) Convert IP addresses to domain names

B) Manage network traffic

C) Encrypt data packets

D) Store recently resolved domain names and IP addresses

Answer: D) Store recently resolved domain names and IP addresses

60. Which protocol is used for transferring files securely over the internet?

A) HTTP

B) FTPS

C) SMTP

D) TCP

Answer: B) FTPS
61. What is the purpose of a VPN (Virtual Private Network)?

A) Connects different networks

B) Connects devices within the same network

C) Encrypts data for secure communication over a public network

D) Manages data flow within a network

Answer: C) Encrypts data for secure communication over a public network

62. Which of the following is a valid IPv6 address range?

A) 2001:0db8:85a3:0000:0000:8a2e:0370:7334

B) 192.168.0.0 - 192.168.255.255

C) 10.0.0.0 - 10.255.255.255

D) All of the above

Answer: A) 2001:0db8:85a3:0000:0000:8a2e:0370:7334

63. What is the purpose of a proxy server in networking?

A) Prevent unauthorized access

B) Manage network traffic

C) Convert IP addresses to domain names

D) Provide a path for outgoing traffic

Answer: B) Manage network traffic

64. Which of the following is a valid MAC address?

A) 192.168.1.1

B) 00:1A:2B:3C:4D:5E
C) www.example.com

D) 255.255.255.0

Answer: B) 00:1A:2B:3C:4D:5E

65. What is the purpose of a subnet in networking?

A) Identify a device on a network

B) Convert IP addresses to domain names

C) Define the network and host portions of an IP address

D) Manage network traffic

Answer: C) Define the network and host portions of an IP address

66. Which of the following is a valid DNS record type?

A) A

B) CNAME

C) MX

D) All of the above

Answer: D) All of the above

67. What is the purpose of a DHCP lease?

A) Assign IP addresses to devices

B) Manage network traffic

C) Encrypt data packets

D) Define the duration for which an IP address is assigned to a device

Answer: D) Define the duration for which an IP address is assigned to a device


68. Which protocol is used for real-time messaging over the internet?

A) HTTP

B) FTP

C) SMTP

D) XMPP

Answer: D) XMPP

69. What is the purpose of a modem in networking?

A) Connects different networks

B) Converts digital signals to analog signals

C) Manages data flow within a network

D) Provides wireless connectivity to devices

Answer: B) Converts digital signals to analog signals

70. Which of the following is a characteristic of a bus network topology?

A) High fault tolerance

B) Requires a central hub

C) Expensive to install

D) Difficult to expand

Answer: A) High fault tolerance

71. What is the purpose of a router in networking?

A) Connects different networks

B) Connects devices within the same network

C) Manages data flow within a network


D) Filters data packets

Answer: A) Connects different networks

72. Which protocol is used for transferring files over a secure connection?

A) HTTP

B) FTPS

C) SMTP

D) TCP

Answer: B) FTPS

73. What is the purpose of a firewall in networking?

A) Prevent unauthorized access

B) Connect devices

C) Manage network traffic

D) Convert data packets

Answer: A) Prevent unauthorized access

74. Which of the following is a valid IPv4 address?

A) 192.168.0.256

B) 300.200.100.50

C) 10.20.30.40

D) 400.500.600.700

Answer: C) 10.20.30.40

75. Which protocol is used for email communication?


A) SMTP

B) FTP

C) HTTP

D) TCP

Answer: A) SMTP

76. What is the function of a router in a network?

A) Connects different networks

B) Connects devices within the same network

C) Manages data flow within a network

D) Filters data packets

Answer: A) Connects different networks

77. Which device is used to connect multiple computers in a LAN?

A) Hub

B) Switch

C) Router

D) Modem

Answer: B) Switch

78. What is the purpose of DNS in networking?

A) Encrypt data packets

B) Convert domain names to IP addresses

C) Manage network traffic

D) Ensure secure communication


Answer: B) Convert domain names to IP addresses

79. Which

of the following is a valid IPv4 address?

A) 192.168.0.256

B) 300.200.100.50

C) 10.20.30.40

D) 400.500.600.700

Answer: C) 10.20.30.40

80. Which layer of the OSI model is responsible for routing?

A) Physical layer

B) Data link layer

C) Network layer

D) Transport layer

Answer: C) Network layer

81. Which protocol is used for secure communication over the internet?

A) HTTP

B) FTP

C) TCP

D) HTTPS

Answer: D) HTTPS
82. What is the purpose of a firewall in a network?

A) Prevent unauthorized access

B) Connect devices

C) Manage network traffic

D) Convert data packets

Answer: A) Prevent unauthorized access

83. What is the maximum transmission speed of a standard Ethernet connection?

A) 10 Mbps

B) 100 Mbps

C) 1 Gbps

D) 10 Gbps

Answer: C) 1 Gbps

84. Which of the following is a wireless communication technology?

A) Ethernet

B) Bluetooth

C) Fiber optics

D) Coaxial cable

Answer: B) Bluetooth

85. What is the purpose of NAT (Network Address Translation)?

A) Encrypt data packets

B) Convert IP addresses to domain names

C) Map private IP addresses to public IP addresses


D) Manage network traffic

Answer: C) Map private IP addresses to public IP addresses

86. Which of the following is not a type of network cable?

A) Coaxial cable

B) Fiber optic cable

C) Twisted pair cable

D) Parallel cable

Answer: D) Parallel cable

87. What is the function of ARP (Address Resolution Protocol)?

A) Convert IP addresses to MAC addresses

B) Convert domain names to IP addresses

C) Manage network traffic

D) Encrypt data packets

Answer: A) Convert IP addresses to MAC addresses

88. Which of the following is a valid MAC address?

A) 192.168.1.1

B) 00:1A:2B:3C:4D:5E

C) www.example.com

D) 255.255.255.0

Answer: B) 00:1A:2B:3C:4D:5E

89. Which protocol is used for transferring files over the internet?
A) HTTP

B) FTP

C) SMTP

D) TCP

Answer: B) FTP

90. What is the purpose of ICMP (Internet Control Message Protocol)?

A) Convert IP addresses to domain names

B) Manage network traffic

C) Test connectivity between devices

D) Encrypt data packets

Answer: C) Test connectivity between devices

91. Which device is used to amplify network signals?

A) Modem

B) Router

C) Repeater

D) Switch

Answer: C) Repeater

92. What is the purpose of QoS (Quality of Service) in networking?

A) Manage network traffic

B) Encrypt data packets

C) Convert IP addresses to domain names

D) Ensure secure communication


Answer: A) Manage network traffic

93. Which of the following is a private IP address range?

A) 10.0.0.0 - 10.255.255.255

B) 172.16.0.0 - 172.31.255.255

C) 192.168.0.0 - 192.168.255.255

D) All of the above

Answer: D) All of the above

94. Which protocol is used for real-time voice and video communication over the internet?

A) HTTP

B) FTP

C) SIP

D) TCP

Answer: C) SIP

95. What is the purpose of VLAN (Virtual Local Area Network)?

A) Connect devices within the same network

B) Manage network traffic

C) Encrypt data packets

D) Divide a single physical network into multiple logical networks

Answer: D) Divide a single physical network into multiple logical networks

96. Which of the following is a valid IPv6 address?

A) 192.168.1.1
B) 2001:0db8:85a3:0000:0000:8a2e:0370:7334

C) www.example.com

D) 255.255.255.0

Answer: B) 2001:0db8:85a3:0000:0000:8a2e:0370:7334

97. What is the purpose of a proxy server?

A) Prevent unauthorized access

B) Manage network traffic

C) Encrypt data packets

D) Convert IP addresses to domain names

Answer: B) Manage network traffic

98. Which of the following is a characteristic of a star network topology?

A) High fault tolerance

B) Requires a central hub

C) Difficult to troubleshoot

D) Limited scalability

Answer: B) Requires a central hub

99. What is the purpose of a MAC address?

A) Identify a device on a network

B) Convert IP addresses to domain names

C) Manage network traffic

D) Encrypt data packets

Answer: A) Identify a device on a network


100. Which protocol is used for remotely accessing servers?

A) FTP

B) SSH

C) SMTP

D) HTTP

Answer: B) SSH

You might also like