Computer Networking Trivia Test!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Shruti M
S
Shruti M
Community Contributor
Quizzes Created: 1 | Total Attempts: 492
Questions: 30 | Attempts: 492

SettingsSettingsSettings
Computer Networking Trivia Test! - Quiz

.


Questions and Answers
  • 1. 

    Computer Network is

    • A.

      Collection of hardware components and computers

    • B.

      Interconnected by communication channels

    • C.

      Sharing of resources and information

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    The correct answer is "All of the Above" because a computer network is indeed a collection of hardware components and computers that are interconnected by communication channels. Additionally, a computer network allows for the sharing of resources and information among the connected devices. Therefore, all the given options accurately describe what a computer network is.

    Rate this question:

  • 2. 

    What is a Firewall in Computer Network?

    • A.

      The physical boundary of Network

    • B.

      An operating System of Computer Network

    • C.

      A system designed to prevent unauthorized access

    • D.

      A web browsing Software

    Correct Answer
    C. A system designed to prevent unauthorized access
    Explanation
    A firewall is a system designed to prevent unauthorized access to a computer network. It acts as a barrier between the internal network and external networks, such as the internet, by monitoring and controlling incoming and outgoing network traffic. It uses a set of rules to determine which traffic is allowed or blocked, based on factors such as the source and destination IP addresses, port numbers, and protocols. By doing so, a firewall helps protect the network from potential security threats and unauthorized access attempts.

    Rate this question:

  • 3. 

    How many layers does the OSI Reference Model have?

    • A.

      4

    • B.

      5

    • C.

      6

    • D.

      7

    Correct Answer
    D. 7
    Explanation
    The OSI Reference Model has seven layers. This model is a conceptual framework that standardizes the functions of a communication system into different layers, each with specific tasks and responsibilities. These layers include the Physical, Data Link, Network, Transport, Session, Presentation, and Application layers. Each layer performs a specific function in the process of transmitting data across a network.

    Rate this question:

  • 4. 

    DHCP is the abbreviation of

    • A.

      Dynamic Host Control Protocol

    • B.

      Dynamic Host Configuration Protocol

    • C.

      Dynamic Hyper Control Protocol

    • D.

      Dynamic Hyper Control Protocol

    Correct Answer
    B. Dynamic Host Configuration Protocol
    Explanation
    DHCP stands for Dynamic Host Configuration Protocol. This protocol is responsible for assigning IP addresses dynamically to devices on a network. It allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration parameters from a DHCP server. This eliminates the need for manual IP address assignment, making network administration more efficient.

    Rate this question:

  • 5. 

    IPV4 Address is

    • A.

      8 bit

    • B.

      16 bit

    • C.

      32 bit

    • D.

      64 bit

    Correct Answer
    C. 32 bit
    Explanation
    An IPv4 address is a 32-bit numerical value that is used to identify a device on a network. It is divided into four octets, each consisting of 8 bits, separated by periods. This addressing scheme allows for a total of approximately 4.3 billion unique addresses, which are assigned to devices such as computers, servers, and routers. IPv4 addresses are essential for communication and routing on the internet, but due to the limited number of available addresses, the transition to IPv6, which uses 128-bit addresses, is being implemented.

    Rate this question:

  • 6. 

    DNS is the abbreviation of

    • A.

      Dynamic Name System

    • B.

      Dynamic Network System

    • C.

      Domain Name System

    • D.

      Domain Network Service

    Correct Answer
    C. Domain Name System
    Explanation
    DNS stands for Domain Name System. It is a decentralized naming system that translates domain names into IP addresses. The DNS is responsible for mapping human-readable domain names to the corresponding IP addresses of the servers hosting the websites or services associated with those domain names. This allows users to access websites or services by simply typing in the domain name instead of the complex IP address. The DNS plays a crucial role in the functioning of the internet by enabling the efficient and reliable communication between devices connected to the network.

    Rate this question:

  • 7. 

    What is the meaning of Bandwidth in Network?

    • A.

      Transmission capacity of a communication channels

    • B.

      Connected Computers in the Network

    • C.

      Class of IP used in Network

    • D.

      None of Above

    Correct Answer
    A. Transmission capacity of a communication channels
    Explanation
    Bandwidth in a network refers to the transmission capacity of a communication channel. It represents the amount of data that can be transmitted over a network in a given amount of time. It is measured in bits per second (bps) and determines how quickly data can be transferred between devices on the network. A higher bandwidth allows for faster and more efficient data transmission, while a lower bandwidth may result in slower network speeds and increased latency.

    Rate this question:

  • 8. 

    What is the use of Bridge in Network?

    • A.

      To connect LANs

    • B.

      To separate LANs

    • C.

      To control Network Speed

    • D.

      All of the above

    Correct Answer
    A. To connect LANs
    Explanation
    Bridges are used to connect LANs (Local Area Networks). They act as a link between two or more LANs, allowing devices from different LANs to communicate with each other. By forwarding data packets between LANs, bridges enable seamless communication and the sharing of resources across the network. Bridges do not separate LANs or control network speed; their primary purpose is to facilitate connectivity between LANs. Therefore, the correct answer is "to connect LANs."

    Rate this question:

  • 9. 

    Router operates in which layer of OSI Reference Model?

    • A.

      Layer 1 (Physical Layer)

    • B.

      Layer 3 (Network Layer)

    • C.

      Layer 4 (Transport Layer)

    • D.

      Layer 7 (Application Layer)

    Correct Answer
    B. Layer 3 (Network Layer)
    Explanation
    A router operates in the network layer of the OSI Reference Model. The network layer is responsible for routing packets across different networks. Routers receive packets from one network, examine the destination IP address, and determine the best path to forward the packet to its destination. They make decisions based on routing tables and protocols such as IP. Therefore, the correct answer is Layer 3 (Network Layer).

    Rate this question:

  • 10. 

    Each IP packet must contain

    • A.

      Only Source address

    • B.

      Only Destination address

    • C.

      Source and Destination address

    • D.

      Source or Destination address

    Correct Answer
    C. Source and Destination address
    Explanation
    Each IP packet must contain both the source and destination address because these addresses are essential for routing the packet through the network. The source address identifies the sender of the packet, while the destination address specifies the intended recipient. This information allows routers to determine the appropriate path for the packet to reach its destination. Without both addresses, the packet would not be able to reach its intended destination effectively.

    Rate this question:

  • 11. 

    Bridge works in which layer of the OSI model?

    • A.

      Appliation layer

    • B.

      Transport layer

    • C.

      Network layer

    • D.

       Datalink layer

    Correct Answer
    D.  Datalink layer
    Explanation
    The correct answer is the Datalink layer. The Datalink layer is responsible for the reliable transmission of data between adjacent network nodes. It provides error-free transmission and ensures that data is properly formatted for transmission over the physical network. Bridges operate at this layer by examining the MAC addresses of incoming frames and forwarding them to the appropriate destination. They help to connect multiple network segments and improve network performance by reducing congestion.

    Rate this question:

  • 12. 

    Which of following provides reliable communication?

    • A.

      TCP

    • B.

      IP

    • C.

      UDP

    • D.

      All of the above

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) provides reliable communication because it ensures that data is delivered in the correct order and without errors. It uses acknowledgments and retransmissions to guarantee that all data packets are received by the intended recipient. TCP also handles congestion control, flow control, and error detection, making it a reliable choice for communication. IP (Internet Protocol) is responsible for addressing and routing packets over the network, while UDP (User Datagram Protocol) is a connectionless protocol that does not provide reliability features like TCP. Therefore, TCP is the correct choice for reliable communication.

    Rate this question:

  • 13. 

    . Which of the following can be Software?

    • A.

      Routers

    • B.

      Firewalls

    • C.

      Gateway

    • D.

      Modems

    Correct Answer
    B. Firewalls
    Explanation
    Firewalls can be considered as software because they are a type of security software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls are installed on computer systems or network devices and work by examining data packets and determining whether to allow or block them based on the configured rules. Therefore, firewalls are a type of software used for network security purposes.

    Rate this question:

  • 14. 

    In which type of RAID, data is mirrored between two disk?

    • A.

      RAID 0

    • B.

      RAID 1

    • C.

      RAID 2

    • D.

      RAID 3

    Correct Answer
    B. RAID 1
    Explanation
    RAID 1 is the correct answer because it is a type of RAID that involves mirroring data between two disks. In RAID 1, data is duplicated on two separate disks, providing redundancy and ensuring that if one disk fails, the data is still accessible from the other disk. This type of RAID is commonly used for data protection and high availability purposes.

    Rate this question:

  • 15. 

    What is the IP Address range of APIPA?

    • A.

      169.254.0.1 to 169.254.0.254

    • B.

      169.254.0.1 to 169.254.0.255

    • C.

      169.254.0.1 to 169.254.255.254

    • D.

      169.254.0.1 to 169.254.255.255

    Correct Answer
    D. 169.254.0.1 to 169.254.255.255
    Explanation
    The correct answer is 169.254.0.1 to 169.254.255.255. This is the correct IP address range for Automatic Private IP Addressing (APIPA). APIPA is a feature in Windows operating systems that allows devices to assign themselves an IP address if they are unable to obtain one from a DHCP server. The range 169.254.0.1 to 169.254.255.255 is reserved specifically for APIPA, ensuring that devices on the same network can communicate with each other using these self-assigned IP addresses.

    Rate this question:

  • 16. 

    Which of the following is correct in CIDR?

    • A.

      . Class A includes Class B network

    • B.

      There are only two networks

    • C.

      There are high & low class network

    • D.

      There is no concept of class A, B, C networks

    Correct Answer
    D. There is no concept of class A, B, C networks
    Explanation
    The concept of class A, B, C networks is not applicable in CIDR (Classless Inter-Domain Routing). CIDR introduced a more flexible way of allocating IP addresses by allowing variable-length subnet masks. This means that the traditional class-based system, where certain ranges of IP addresses were reserved for specific classes (A, B, C), is no longer used. Instead, CIDR allows for the allocation of IP addresses based on the actual number of required hosts, resulting in a more efficient use of IP address space.

    Rate this question:

  • 17. 

    What is the natural mask for a class C Network?

    • A.

      255.255.255.1

    • B.

      255.255.255.0

    • C.

      255.255.255.254

    • D.

      255.255.255.255

    Correct Answer
    B. 255.255.255.0
    Explanation
    The natural mask for a class C network is 255.255.255.0. In classful networking, the class C network range is from 192.0.0.0 to 223.255.255.255, and the default subnet mask for this range is 255.255.255.0. This mask allows for 256 subnets and 254 hosts per subnet, making it suitable for small to medium-sized networks.

    Rate this question:

  • 18. 

    Which one of the following computer network is built on the top of another network?

    • A.

      Prior network

    • B.

      Chief network

    • C.

      Prime network

    • D.

      Overlay network

    Correct Answer
    D. Overlay network
    Explanation
    An overlay network is a computer network that is built on top of another network. It is used to enable communication between different networks or to provide additional services on top of an existing network. This type of network allows for virtual connections to be established between nodes, regardless of their physical locations or the underlying network infrastructure. It is commonly used in scenarios where there is a need to create a separate network with specific functionalities without modifying the underlying network.

    Rate this question:

  • 19. 

    Bluetooth is an example of

    • A.

      Personal area network

    • B.

      Local area network

    • C.

      Virtual private network

    • D.

      None of the mentioned

    Correct Answer
    A. Personal area network
    Explanation
    Bluetooth is an example of a personal area network (PAN). A PAN is a network that is used for communication between devices in close proximity to each other, typically within a range of 10 meters. Bluetooth technology allows devices such as smartphones, laptops, and headphones to connect and communicate with each other wirelessly. It is commonly used for tasks such as transferring files, streaming audio, and connecting peripherals like keyboards and mice. Therefore, Bluetooth fits the definition and characteristics of a personal area network.

    Rate this question:

  • 20. 

    In computer network nodes are

    • A.

      The computer that originates the data

    • B.

      The computer that routes the data

    • C.

      The computer that terminates the data

    • D.

      All of the mentioned

    Correct Answer
    A. The computer that originates the data
    Explanation
    In computer networks, nodes refer to the various devices or computers that are connected to the network. These nodes can perform different functions within the network, such as originating, routing, or terminating data. However, in this case, the correct answer is "the computer that originates the data." This means that the node in question is responsible for starting or creating the data that will be transmitted across the network.

    Rate this question:

  • 21. 

    What is the benefit of Networking?

    • A.

      File Sharing

    • B.

      Easier access to Resources

    • C.

      Easier Backups

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    Networking provides several benefits, including file sharing, easier access to resources, and easier backups. By connecting multiple devices in a network, users can easily share files and collaborate on projects. Networking also allows for easier access to shared resources such as printers, scanners, and storage devices, enhancing productivity. Additionally, networking enables automated backups, ensuring that important data is securely stored and easily recoverable in case of any issues. Therefore, the correct answer is "All of the Above."

    Rate this question:

  • 22. 

    The meaning of Straight-through Cable is

    • A.

      Four wire pairs connect to the same pin on each end

    • B.

      The cable Which Directly connects Computer to Computer

    • C.

      Four wire pairs not twisted with each other

    • D.

      The cable which is not twisted

    Correct Answer
    A. Four wire pairs connect to the same pin on each end
    Explanation
    A straight-through cable refers to a type of Ethernet cable where the four wire pairs within the cable are connected to the same pin on each end. This means that the wires are not crossed or twisted with each other. Straight-through cables are commonly used to connect devices such as computers to switches or routers.

    Rate this question:

  • 23. 

    Which of the following is not the External Security Threats?

    • A.

      Front-door Threats

    • B.

      Back-door Threats

    • C.

      Underground Threats

    • D.

      Denial of Service (DoS)

    Correct Answer
    C. Underground Threats
  • 24. 

    Which of the following is/are Protocols of Application?

    • A.

      FTP

    • B.

      DNS

    • C.

      Telnet

    • D.

      All of above

    Correct Answer
    D. All of above
    Explanation
    All of the given options, FTP, DNS, and Telnet, are protocols of application. FTP (File Transfer Protocol) is used for transferring files between computers on a network. DNS (Domain Name System) is responsible for translating domain names into IP addresses. Telnet is a network protocol that allows for remote login and control of a computer. Therefore, all of the options mentioned are protocols of application.

    Rate this question:

  • 25. 

    MAC Address is the example of

    • A.

      Transport Layer

    • B.

      Data Link Layer

    • C.

      . Application Layer

    • D.

      Physical Layer

    Correct Answer
    B. Data Link Layer
    Explanation
    A MAC address, also known as a Media Access Control address, is a unique identifier assigned to network interfaces for communications on a network. It is used at the Data Link Layer of the OSI model to control access to the physical network medium. The Data Link Layer is responsible for the reliable transmission of data between adjacent network nodes and the MAC address plays a crucial role in this process by identifying the source and destination of data packets within a local network. Therefore, the MAC address is an example of the Data Link Layer.

    Rate this question:

  • 26. 

    What is the Demilitarized Zone?

    • A.

      The area between firewall & connection to an external network

    • B.

      The area between ISP to Military area

    • C.

      The area surrounded by secured servers

    • D.

      The area surrounded by the Military

    Correct Answer
    A. The area between firewall & connection to an external network
    Explanation
    The Demilitarized Zone (DMZ) is a network security measure that acts as a buffer zone between an organization's internal network (protected by a firewall) and the external network (usually the internet). It is designed to provide an additional layer of security by segregating and isolating potentially vulnerable systems from the rest of the network. The DMZ allows limited access to specific services and resources, while blocking direct access to the internal network, thereby reducing the risk of unauthorized access and potential attacks.

    Rate this question:

  • 27. 

    Which of the following is correct in VLSM?

    • A.

      Can have subnets of different sizes

    • B.

      Subnets must be in same size

    • C.

      No required of subnet

    • D.

      All of above

    Correct Answer
    A. Can have subnets of different sizes
    Explanation
    In Variable Length Subnet Masking (VLSM), it is possible to have subnets of different sizes. VLSM allows for the allocation of subnet masks with varying lengths, which means that subnets can be divided into smaller or larger subnets based on the network's requirements. This flexibility in subnet size allocation is one of the key advantages of VLSM, as it allows for efficient utilization of IP addresses and better network management.

    Rate this question:

  • 28. 

    A _____ is a device that forwards packets between networks by processing the routing information included in the packet.

    • A.

      Bridge

    • B.

      Firewall

    • C.

      Router

    • D.

      All of the mentioned

    Correct Answer
    C. Router
    Explanation
    A router is a device that forwards packets between networks by processing the routing information included in the packet. It examines the destination IP address of the packet and determines the best path for the packet to reach its destination. Routers are crucial in connecting different networks and directing traffic efficiently. They play a key role in ensuring that data packets are delivered to the correct destination in a network.

    Rate this question:

  • 29. 

    Network congestion occurs

    • A.

      In case of traffic overloading

    • B.

      When a system terminates

    • C.

      When connection between two nodes terminates

    • D.

       none of the mentioned

    Correct Answer
    A. In case of traffic overloading
    Explanation
    Network congestion occurs in case of traffic overloading. This means that when there is an excessive amount of data being transmitted through a network, it can lead to congestion. This congestion can result in slower data transfer speeds, packet loss, and overall degradation of network performance. Therefore, the correct answer is "in case of traffic overloading".

    Rate this question:

  • 30. 

    Which of these is not a guided media?

    • A.

      Fiber optical cable

    • B.

      Coaxial cable

    • C.

      Wireless LAN

    • D.

      Copper wire

    Correct Answer
    C. Wireless LAN
    Explanation
    Wireless LAN is not a guided media because it does not require physical cables to transmit data. Instead, it uses wireless signals to transmit data over the air. In contrast, fiber optical cable, coaxial cable, and copper wire are all examples of guided media as they use physical cables to transmit data.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 16, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 21, 2020
    Quiz Created by
    Shruti M
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.