Home» Online Test » Technology » Networking Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Networking Online Test' covers questions across all the topics related to the Networking like WiFi, Ethernet, LAN, WAN, IP, ISP, etc Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What method is commonly used in email spoofing attacks? a) Sending genuine emails from trusted sources b) Impersonating a legitimate sender's email address c) Encrypting email content to prevent interception d) Filtering out spam messages from the inbox 2 / 30 2. Which of the following is a common type of spoofing attack? a) ARP poisoning b) DNS cache poisoning c) SYN flooding d) Ping flooding 3 / 30 3. What is a Denial of Service (DoS) attack? a) A Denial of Service (DoS) attack is an attempt by an attacker to gain unauthorized access to a network by exploiting vulnerabilities in the system. b) A Denial of Service (DoS) attack is an attempt to disrupt or interrupt the normal functioning of a network, service, or website by overwhelming it with a flood of illegitimate traffic or requests. c) A Denial of Service (DoS) attack is a type of malware that encrypts files on a victim's system and demands a ransom for their release. d) A Denial of Service (DoS) attack is a form of social engineering where attackers manipulate individuals into revealing sensitive information. 4 / 30 4. Which of the following is a potential drawback of a hybrid topology? a) Lack of flexibility b) High implementation and maintenance costs c) Limited scalability d) Reduced fault tolerance 5 / 30 5. What is symmetric encryption? a) Symmetric encryption uses the same key for both encryption and decryption. b) Symmetric encryption uses different keys for encryption and decryption. c) Symmetric encryption requires a public and private key pair. d) Symmetric encryption is not commonly used in network security. 6 / 30 6. What is the structure of a MAC address? a) Four octets separated by periods b) Six bytes separated by colons or dashes c) Eight hexadecimal digits separated by dashes d) Two groups of eight bits separated by periods 7 / 30 7. Which device is responsible for VLAN tagging and untagging? a) Switch b) Router c) Access Point d) Modem 8 / 30 8. What is the main difference between public and private IP addresses? a) Public IP addresses are assigned by ISPs, while private IP addresses are assigned by network administrators. b) Public IP addresses are globally unique and routable on the internet, while private IP addresses are only used within private networks. c) Public IP addresses are more secure than private IP addresses. d) Private IP addresses are reserved for specific types of devices, while public IP addresses can be used by any device. 9 / 30 9. What is 2G technology in cellular networks? a) The second generation of cellular network technology, offering digital voice communication and limited data services b) The latest generation of cellular network technology, providing high-speed internet access and low latency c) A type of satellite communication technology used for global internet connectivity d) An obsolete technology replaced by newer generations like 3G, 4G, and 5G 10 / 30 10. What is a primary advantage of a mesh topology? a) Simplified network design b) Reduced cabling requirements c) High redundancy and fault tolerance d) Centralized control 11 / 30 11. What is a defining characteristic of the peer-to-peer (P2P) model? a) Centralized server management b) Equal roles for all devices in the network c) Use of a central hub for all data transmissions d) Exclusive client-server relationships 12 / 30 12. What is the primary function of a modem in internet access? a) To manage network traffic within a LAN b) To amplify network signals for long-distance transmission c) To convert digital data from computers into analog signals for transmission over communication lines d) To encrypt network traffic for secure transmission 13 / 30 13. Which application is commonly associated with the peer-to-peer model? a) Email services b) Web hosting c) File sharing applications like BitTorrent d) Centralized database management 14 / 30 14. What is WEP in the context of wireless security? a) Wireless Encryption Protocol b) Wired Equivalent Privacy c) Wi-Fi Encapsulation Protocol d) Wireless Extensible Protocol 15 / 30 15. What is a major drawback of implementing a mesh topology? a) High cost and complexity due to extensive cabling b) Limited fault tolerance c) Centralized failure point d) Slow data transmission speeds 16 / 30 16. What is the "three-way handshake" in TCP? a) A process for encrypting data packets before transmission b) A method for routing data packets between networks c) A connection establishment process involving SYN, SYN-ACK, and ACK packets d) A technique for compressing data packets to save bandwidth 17 / 30 17. What is the purpose of a digital signature in authentication? a) To encrypt data transmissions over the network b) To identify and verify the identity of users or devices c) To grant or deny access to network resources based on defined rules d) To provide integrity and authenticity of digital documents or messages 18 / 30 18. How can encryption help mitigate the risk of Man-in-the-Middle (MitM) attacks? a) Encryption prevents attackers from intercepting communication between two parties. b) Encryption prevents attackers from spoofing ARP messages. c) Encryption prevents attackers from flooding a target system with excessive traffic. d) Encryption prevents attackers from exploiting vulnerabilities in the TCP/IP stack. 19 / 30 19. Which protocol does TCP use to manage data transmission between devices? a) FTP b) IP c) HTTP d) ACK (Acknowledgment) 20 / 30 20. What is the role of IP (Internet Protocol) in the TCP/IP model? a) To provide reliable data transmission and error detection b) To define the format and structure of data packets c) To address and route data packets between different networks d) To manage communication sessions between applications 21 / 30 21. What is asymmetric encryption? a) Asymmetric encryption uses the same key for both encryption and decryption. b) Asymmetric encryption uses different keys for encryption and decryption. c) Asymmetric encryption requires a public and private key pair. d) Asymmetric encryption is not commonly used in network security. 22 / 30 22. What is a potential drawback of multipoint-to-multipoint topologies? a) Higher complexity and cost b) Reduced data transmission speed c) Limited scalability d) Centralized failure point 23 / 30 23. What is a significant disadvantage of a ring topology? a) High cost of installation b) Complex cable management c) A single point of failure can disrupt the entire network d) Difficult to add new nodes 24 / 30 24. Which IP address is an example of a public IP address? a) 192.168.1.1 b) 10.0.0.1 c) 172.16.0.1 d) 203.0.113.1 25 / 30 25. Which protocol is essential for sending emails from a client to a mail server? a) HTTP b) FTP c) SMTP d) HTTPS 26 / 30 26. What is the purpose of HTTPS? a) To transfer files securely between computers b) To send and receive emails securely c) To secure web communication using encryption d) To manage network traffic 27 / 30 27. What is the difference between a unicast and a multicast MAC address? a) A unicast MAC address is used for communication between two individual devices, while a multicast MAC address is used for communication to a specific group of devices. b) A unicast MAC address is used for communication within the same VLAN, while a multicast MAC address is used for communication between different VLANs. c) A unicast MAC address is used for communication within a LAN, while a multicast MAC address is used for communication over the internet. d) A unicast MAC address is used for communication with devices in promiscuous mode, while a multicast MAC address is used for communication with devices in normal mode. 28 / 30 28. What is a primary advantage of the peer-to-peer model? a) Centralized control and easy management b) High scalability and cost-effectiveness c) Reduced security risks d) Simplified backup and recovery 29 / 30 29. What is the purpose of access control lists (ACLs) in network security? a) To encrypt data transmissions over the network b) To monitor network traffic for security threats c) To grant or deny access to network resources based on defined rules d) To identify and verify the identity of users or devices 30 / 30 30. Which device typically acts as the central point in a star topology? a) Router b) Hub or switch c) Modem d) Repeater Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Share the above MCQs:Click to share on Facebook (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on X (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)