Home» Online Test » Technology » Networking Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Networking Online Test' covers questions across all the topics related to the Networking like WiFi, Ethernet, LAN, WAN, IP, ISP, etc Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is the range of IP addresses reserved for private networks according to RFC 1918? a) 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255 b) 169.254.0.0 - 169.254.255.255 c) 192.0.2.0 - 192.0.2.255 d) 127.0.0.0 - 127.255.255.255 2 / 30 2. How does a Man-in-the-Middle (MitM) attack typically occur? a) A Man-in-the-Middle (MitM) attack typically occurs when an attacker gains physical access to a network infrastructure device. b) A Man-in-the-Middle (MitM) attack typically occurs when an attacker exploits vulnerabilities in the encryption protocols used to secure network communication. c) A Man-in-the-Middle (MitM) attack typically occurs when an attacker intercepts communication between two parties by inserting themselves into the communication path. d) A Man-in-the-Middle (MitM) attack typically occurs when an attacker floods a target system with a large volume of traffic or requests. 3 / 30 3. How do spoofing attacks exploit vulnerabilities in communication protocols? a) By encrypting data transmitted over the network b) By intercepting communication between two parties c) By forging or falsifying information, such as IP addresses or email headers d) By flooding the network with excessive traffic or requests 4 / 30 4. What is a primary function of TCP (Transmission Control Protocol)? a) To provide connectionless communication b) To ensure reliable data transmission and error correction c) To encrypt network traffic for secure transmission d) To route data packets between different networks 5 / 30 5. What is the main difference between FTP and SFTP? a) FTP is used for transferring files, while SFTP is used for secure email transmission. b) FTP transfers files in plain text, while SFTP transfers files securely using encryption. c) FTP uses port 21, while SFTP uses port 80. d) FTP is used for web browsing, while SFTP is used for secure file transfers. 6 / 30 6. What is a network firewall? a) A network firewall is a physical barrier installed between network segments to prevent unauthorized access. b) A network firewall is a software or hardware-based security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. c) A network firewall is a cryptographic protocol used to encrypt data transmitted over a network. d) A network firewall is a network access control mechanism that grants or denies access to network resources based on defined rules. 7 / 30 7. What is the primary advantage of using CIDR notation? a) Simplifies network configuration b) Reduces IP address space wastage c) Improves network security d) Increases network performance 8 / 30 8. Which layer of the TCP/IP model corresponds to the OSI model's Network layer? a) Application layer b) Transport layer c) Internet layer d) Data Link layer 9 / 30 9. What is the difference between authentication and non-repudiation? a) Authentication verifies the identity of users or devices, while non-repudiation ensures the integrity of data transmissions. b) Authentication ensures the integrity of data transmissions, while non-repudiation verifies the identity of users or devices. c) Authentication and non-repudiation are two terms for the same process in network security. d) Authentication and non-repudiation are not relevant to network security. 10 / 30 10. Which protocol uses port 25 by default? a) HTTP b) FTP c) SMTP d) HTTPS 11 / 30 11. How does a hub differ from a switch? a) A hub forwards data packets based on MAC addresses, while a switch forwards data packets based on IP addresses. b) A hub operates at the physical layer of the OSI model, while a switch operates at the data link layer. c) A hub connects devices within the same network, while a switch connects different networks. d) A hub broadcasts data packets to all connected devices, while a switch forwards data packets to specific devices. 12 / 30 12. What is the CIDR notation for the subnet mask 255.255.248.0? a) /22 b) /19 c) /21 d) /20 13 / 30 13. What types of connections do modems typically support? a) Wired connections only b) Wireless connections only c) Both wired and wireless connections d) Satellite connections only 14 / 30 14. What is the difference between site-to-site VPN and remote access VPN? a) Site-to-site VPN connects multiple remote sites or networks, while remote access VPN allows individual users to securely connect to a corporate network from remote locations b) Site-to-site VPN uses hardware-based encryption, while remote access VPN uses software-based encryption c) Site-to-site VPN is more secure than remote access VPN d) Site-to-site VPN requires dedicated leased lines, while remote access VPN uses public internet connections 15 / 30 15. What is the purpose of a digital signature in authentication? a) To encrypt data transmissions over the network b) To identify and verify the identity of users or devices c) To grant or deny access to network resources based on defined rules d) To provide integrity and authenticity of digital documents or messages 16 / 30 16. Which OSI layer is responsible for routing data packets between different networks? a) Application layer b) Data Link layer c) Network layer d) Transport layer 17 / 30 17. What are the advantages of wireless networks? a) Increased security due to the absence of physical connections b) Improved mobility and flexibility in device placement c) Lower cost of infrastructure installation and maintenance d) Reduced susceptibility to interference from external sources 18 / 30 18. What is the difference between authentication and authorization in network security? a) Authentication verifies the identity of users or devices, while authorization grants or denies access to network resources. b) Authentication grants or denies access to network resources, while authorization verifies the identity of users or devices. c) Authentication and authorization are two terms for the same process in network security. d) Authentication and authorization are not relevant to network security. 19 / 30 19. What is the purpose of HTTPS? a) To transfer files securely between computers b) To send and receive emails securely c) To secure web communication using encryption d) To manage network traffic 20 / 30 20. What is the purpose of ARP cache? a) To store MAC addresses associated with IP addresses for future reference b) To store DNS records for domain name resolution c) To store encryption keys for secure data transmission d) To store routing tables for packet forwarding 21 / 30 21. Which protocol is essential for sending emails from a client to a mail server? a) HTTP b) FTP c) SMTP d) HTTPS 22 / 30 22. In a client-server architecture, what is typically stored on the server? a) Minimal processing power and storage b) Client-specific data only c) Shared resources, applications, and databases d) Temporary cache files 23 / 30 23. What is the purpose of the second half of a MAC address? a) To identify the manufacturer of the network interface b) To provide a unique serial number for the device c) To specify the network to which the device belongs d) To identify the specific device within the manufacturer's range 24 / 30 24. What is the purpose of the Address Resolution Protocol (ARP) in networking? a) To translate IP addresses to MAC addresses b) To translate domain names to IP addresses c) To encrypt data transmissions over the internet d) To establish secure VPN connections 25 / 30 25. How does a hybrid topology benefit network performance? a) By reducing the number of nodes b) By isolating network traffic in specific segments c) By simplifying network management d) By eliminating the need for network redundancy 26 / 30 26. Which OSI layer is responsible for end-to-end communication and error recovery? a) Session layer b) Transport layer c) Presentation layer d) Network layer 27 / 30 27. How does ARP poisoning work in a Man-in-the-Middle (MitM) attack? a) ARP poisoning involves flooding a target system with ARP requests to exhaust its ARP cache and disrupt network communication. b) ARP poisoning involves sending falsified ARP messages to associate the attacker's MAC address with the IP address of a legitimate network device, allowing the attacker to intercept and potentially alter communication between the legitimate parties. c) ARP poisoning involves intercepting and modifying network traffic to exploit vulnerabilities in the TCP/IP stack of a target system. d) ARP poisoning involves flooding a target system with ICMP echo request packets (pings) to consume its network bandwidth and resources, rendering it unreachable. 28 / 30 28. What is the purpose of access control lists (ACLs) in network security? a) To encrypt data transmissions over the network b) To monitor network traffic for security threats c) To grant or deny access to network resources based on defined rules d) To identify and verify the identity of users or devices 29 / 30 29. How many bits are used for IP addresses in IPv4? a) 32 bits b) 64 bits c) 128 bits d) 256 bits 30 / 30 30. What is 2G technology in cellular networks? a) The second generation of cellular network technology, offering digital voice communication and limited data services b) The latest generation of cellular network technology, providing high-speed internet access and low latency c) A type of satellite communication technology used for global internet connectivity d) An obsolete technology replaced by newer generations like 3G, 4G, and 5G Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Networking MCQ PDF for Offline Study Share the above MCQs:Click to share on Facebook (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on X (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)