Networking Test 2

Copied!

Online Information Technology: Networking Test 2 for different Competitive Exams, Entrance Tests & Job Interviews. Test yourself. Take various online tests and find out how well you score before appearing in your upcoming interviews and written tests.

Instructions

Welcome to our FREE online test. Beware of anyone asking for money to take this test.

Total questions: 20

Time limit: 30 minutes

Each question is worth 1 point, and there are no penalties for wrong answers.

DO NOT refresh the page.

Good luck!

Time remaining: 30:00
1. What is the primary function of a firewall in a network?
  1. To monitor and control incoming and outgoing network traffic based on predetermined security rules
  2. To amplify the network signal to prevent signal loss
  3. To convert digital signals into analog signals for transmission
  4. To redirect network traffic to different destinations
2. Which layer of the OSI model is responsible for routing packets between networks?
  1. Network Layer
  2. Data Link Layer
  3. Transport Layer
  4. Physical Layer
3. Fill in the blank: A _______ network uses a central server to manage network resources and client computers to access these resources.
  1. Client-Server
  2. Peer-to-Peer
  3. Mesh
  4. Ring
4. Which of the following is NOT a valid IPv6 address format?
  1. 192.168.1.1
  2. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  3. fe80::1ff:fe23:4567:890a
  4. 2001::1
5. Scenario: A company wants to ensure that all data transferred between its headquarters and remote branches remains confidential. Which technology should they implement?
  1. VPN
  2. VLAN
  3. DNS
  4. DHCP
6. Which of the following is a characteristic of a peer-to-peer network?
  1. Centralized server
  2. Decentralized sharing of resources
  3. High level of security
  4. Complex network administration
7. Assertion (A): DNS translates domain names into IP addresses.
Reason (R): DNS resolves IP addresses into domain names.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
8. Fill in the blank: _______ is a protocol used for transferring files over a network.
  1. TCP
  2. FTP
  3. UDP
  4. IP
9. Which of the following is NOT a type of wireless network security encryption?
  1. WEP
  2. WPA
  3. FTP
  4. WPA2
10. Arrange the following network topologies in increasing order of complexity: Bus, Ring, Star, Mesh
  1. Star, Mesh, Ring, Bus
  2. Bus, Ring, Star, Mesh
  3. Ring, Bus, Star, Mesh
  4. Mesh, Star, Ring, Bus
11. Which of the following protocols is used for dynamically assigning IP addresses to devices on a network?
  1. TCP
  2. HTTP
  3. FTP
  4. DHCP
12. Assertion (A): SSL/TLS is used for securing web communication.
Reason (R): SSL/TLS encrypts data transmitted between the client and the server.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
13. Fill in the blank: In a client-server network, the client requests services, and the _______ provides services.
  1. Server
  2. Router
  3. Switch
  4. Hub
14. Which of the following is a valid IPv4 address?
  1. 192.168.1.1
  2. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  3. fe80::1ff:fe23:4567:890a
  4. 255.255.255.255.255
15. Scenario: You are setting up a wireless network for a small office. The office has multiple devices that need to connect to the network, and security is a major concern. Which of the following security protocols should you implement to ensure the highest level of security?
  1. WPA3
  2. WEP
  3. WPA
  4. WPA2
16. Which of the following is NOT a characteristic of a bus network topology?
  1. Easy to set up and extend
  2. Requires less cabling
  3. High fault tolerance
  4. Data collision can occur
17. Assertion (A): FTP is a protocol used for transferring files over a network.
Reason (R): FTP uses TCP for reliable data transfer.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
18. Fill in the blank: _______ is used to convert domain names into IP addresses.
  1. SMTP
  2. DNS
  3. POP3
  4. FTP
19. Which of the following is a valid MAC address?
  1. 192.168.1.1
  2. 00:1A:2B:3C:4D:5E
  3. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  4. fe80::1ff:fe23:4567:890a
20. Arrange the following network topologies in increasing order of fault tolerance: Bus, Ring, Star, Mesh
  1. Star, Mesh, Ring, Bus
  2. Ring, Bus, Star, Mesh
  3. Mesh, Star, Ring, Bus
  4. Bus, Ring, Star, Mesh
Copied!

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top