Networking Test 3

Copied!

Online Networking Test 3 for different Competitive Exams, Entrance Tests & Job Interviews. Test yourself. Take various online tests and find out how well you score before appearing in your upcoming interviews and written tests.

Instructions

Welcome to our FREE online test. Beware of anyone asking for money to take this test.

Total questions: 20

Time limit: 30 minutes

Each question is worth 1 point, and there are no penalties for wrong answers.

DO NOT refresh the page.

Good luck!

Time remaining: 30:00
1. What does the acronym ‘SSID’ stand for in the context of wireless networking?
  1. Secure Set Identifier
  2. Standard Service Identifier
  3. Service Set Identifier
  4. System Service Identifier
2. Assertion (A): A router operates at the Network Layer of the OSI model.
Reason (R): Routers use IP addresses to forward packets to their destination.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
3. Fill in the blank: A _______ is used to connect and allow communication between different networks.
  1. Switch
  2. Router
  3. Hub
  4. Modem
4. Scenario: Your office has frequent network congestion due to high traffic volume. Which device can help manage and reduce network traffic effectively?
  1. Hub
  2. Switch
  3. Repeater
  4. Bridge
5. Which of the following IP address ranges is reserved for private networks?
  1. 10.0.0.0 – 10.255.255.255
  2. 192.168.0.0 – 192.168.255.255
  3. 172.16.0.0 – 172.31.255.255
  4. All of the above
6. Which of the following best describes a VPN (Virtual Private Network)?
  1. A local area network within a single building
  2. A network that connects multiple devices within a small area
  3. A secure network connection over the internet
  4. A protocol used for sending email
7. Assertion (A): The Transmission Control Protocol (TCP) ensures reliable data transfer.
Reason (R): TCP divides messages into fixed-size packets before sending them.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
8. Fill in the blank: The _______ protocol is used for sending email from a client to a server or between servers.
  1. FTP
  2. SMTP
  3. HTTP
  4. IMAP
9. Which of the following is NOT a function of a network switch?
  1. Forwarding data to the destination device
  2. Learning the MAC addresses of devices connected to it
  3. Reducing network congestion
  4. Assigning IP addresses to devices
10. Scenario: An organization needs to isolate traffic between different departments while using the same physical network infrastructure. Which technology should they implement?
  1. VPN
  2. NAT
  3. VLAN
  4. DHCP
11. Which layer of the OSI model is responsible for data encryption and decryption?
  1. Presentation Layer
  2. Network Layer
  3. Data Link Layer
  4. Application Layer
12. Assertion (A): IPv6 uses 128-bit addresses.
Reason (R): IPv6 was developed to provide more address space than IPv4.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
13. Fill in the blank: The _______ protocol is used for secure communication over a computer network and is widely used on the Internet.
  1. HTTP
  2. FTP
  3. HTTPS
  4. SMTP
14. Which of the following is a common use of the Simple Network Management Protocol (SNMP)?
  1. Sending emails
  2. Monitoring network devices
  3. File transfer
  4. Browsing the web
15. Scenario: A company wants to ensure that only authorized devices can connect to their wireless network. Which of the following methods can help achieve this?
  1. MAC address filtering
  2. Using a hub
  3. Changing the SSID
  4. Configuring a proxy server
16. What is the primary function of a firewall in a network?
  1. To connect different networks
  2. To assign IP addresses to devices
  3. To monitor and control incoming and outgoing network traffic
  4. To provide wireless connectivity
17. Assertion (A): MPLS (Multiprotocol Label Switching) can enhance network speed.
Reason (R): MPLS uses labels to forward packets, reducing the need for complex routing table lookups.
  1. Both A and R are true, and R is the correct explanation of A.
  2. Both A and R are true, but R is not the correct explanation of A.
  3. A is true, but R is false.
  4. A is false, but R is true.
18. Fill in the blank: The process of converting a domain name into its corresponding IP address is known as _______.
  1. Encapsulation
  2. Subnetting
  3. Resolution
  4. Segmentation
19. Which of the following IP addresses is in the range reserved for APIPA (Automatic Private IP Addressing)?
  1. 192.168.1.1
  2. 172.16.0.1
  3. 169.254.1.1
  4. 10.0.0.1
20. Scenario: A network administrator wants to reduce the broadcast traffic on a LAN. Which technology should be implemented?
  1. VLANs
  2. VPNs
  3. DHCP
  4. NAT

Discover more from TEST

Subscribe to get the latest posts sent to your email.

Copied!

Leave a Comment

Scroll to Top