Networking Test 1

Copied!

Online Networking Test 1 for different Competitive Exams, Entrance Tests & Job Interviews. Test yourself. Take various online tests and find out how well you score before appearing in your upcoming interviews and written tests.

Instructions

Welcome to our FREE online test. Beware of anyone asking for money to take this test.

Total questions: 20

Time limit: 30 minutes

Each question is worth 1 point, and there are no penalties for wrong answers.

DO NOT refresh the page.

Good luck!

Time remaining: 30:00
1. Which protocol is used to securely browse the internet?
  1. FTP
  2. HTTP
  3. HTTPS
  4. SMTP
2. Match the following networking devices with their primary function:
  1. Router – Directs traffic
  2. Switch – Converts digital signals
  3. Modem – Connects multiple networks
  4. Hub – Stores data
3. You are managing a network that has recently started experiencing slow speeds and high latency. After diagnosing, you discover that the issue is with the primary DNS server. Which of the following actions is most likely to resolve this issue?
  1. Switching to a secondary DNS server
  2. Rebooting all computers
  3. Upgrading the network cables
  4. Installing new antivirus software
4. Arrange the following steps in the correct sequence to establish a secure VPN connection:
  1. Connect to VPN server, Launch VPN client, Enter login credentials, Verify connection
  2. Launch VPN client, Enter login credentials, Connect to VPN server, Verify connection
  3. Enter login credentials, Launch VPN client, Verify connection, Connect to VPN server
  4. Verify connection, Launch VPN client, Connect to VPN server, Enter login credentials
5. In a peer-to-peer network, resources are _______ shared among the connected computers.
  1. Indirectly
  2. Partially
  3. Securely
  4. Directly
6. Which layer of the OSI model is responsible for error detection and correction?
  1. Network Layer
  2. Transport Layer
  3. Physical Layer
  4. Data Link Layer
7. Assertion (A): IPv6 addresses are written in hexadecimal format.
Reason (R): IPv6 uses a 128-bit address space.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
8. Fill in the blank: In a client-server network, the client requests services, and the _______ provides services.
  1. Router
  2. Server
  3. Switch
  4. Hub
9. Which of the following is a valid IPv4 address?
  1. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  2. fe80::1ff:fe23:4567:890a
  3. 255.255.255.255.255
  4. 192.168.1.1
10. Arrange the following networking components in the correct order for data transmission from a source to a destination:
  1. Sender, Switch, Router, Receiver
  2. Router, Sender, Receiver, Switch
  3. Receiver, Switch, Sender, Router
  4. Sender, Router, Switch, Receiver
11. Which of the following protocols is used for email transmission?
  1. SNMP
  2. FTP
  3. SMTP
  4. IMAP
12. Assertion (A): Firewalls can prevent unauthorized access to a network.
Reason (R): Firewalls inspect incoming and outgoing traffic based on predefined security rules.
  1. Both A and R are true, but R is not the correct explanation of A.
  2. Both A and R are true, and R is the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
13. Fill in the blank: The process of converting a domain name into its corresponding IP address is called _______.
  1. DNS resolution
  2. IP forwarding
  3. ARP resolution
  4. DHCP leasing
14. Which of the following addresses is a multicast address?
  1. 224.0.0.1
  2. 127.0.0.1
  3. 192.168.0.1
  4. 172.16.0.1
15. Scenario: You are setting up a wireless network for a small office. The office has multiple devices that need to connect to the network, and security is a major concern. Which of the following security protocols should you implement to ensure the highest level of security?
  1. WEP
  2. WPA3
  3. WPA
  4. WPA2
16. Which topology is characterized by each computer being connected to a single central hub?
  1. Star Topology
  2. Ring Topology
  3. Mesh Topology
  4. Bus Topology
17. Assertion (A): NAT helps in conserving the number of public IP addresses used by an organization.
Reason (R): NAT translates private IP addresses to a single public IP address and vice versa.
  1. A is true, but R is false.
  2. A is false, but R is true.
  3. Both A and R are true, and R is the correct explanation of A.
  4. Both A and R are true, but R is not the correct explanation of A.
18. Fill in the blank: The device that regenerates and amplifies the signal over the same network before it becomes too weak or corrupted is called a _______.
  1. Router
  2. Repeater
  3. Switch
  4. Hub
19. Which of the following is not an application layer protocol?
  1. ICMP
  2. HTTP
  3. FTP
  4. SMTP
20. Scenario: A company wants to extend its network to include a remote office. The connection needs to be secure and allow for encrypted communication. Which technology should they implement?
  1. LAN
  2. VLAN
  3. WAN
  4. VPN
Copied!

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top