Computer networks are the backbone of modern communication. As the digital age continues to evolve, understanding the basics of computer networking becomes ever more important.
This quiz is designed to test your knowledge of the fundamental concepts of computer networking. Each question comes with a detailed explanation, ensuring you not only know the answer but understand the rationale behind it.
1. Which device is primarily used to link two or more separate networks?
Answer:
Explanation:
Routers are specifically designed to route data packets between different networks, enabling communication between them.
2. What does LAN stand for?
Answer:
Explanation:
LAN stands for Local Area Network. It's a network that connects computers within a limited area such as a home, school, or office.
3. Which protocol is used for sending email?
Answer:
Explanation:
SMTP stands for Simple Mail Transfer Protocol and it's used for sending emails.
4. Which protocol is used to securely access web content?
Answer:
Explanation:
HTTPS stands for HyperText Transfer Protocol Secure and is used to access web content securely, often symbolized by a padlock icon in browsers.
5. Which protocol is used to transfer files between a client and a server on the internet?
Answer:
Explanation:
FTP, or File Transfer Protocol, is specifically designed for transferring files over a network.
6. Which layer of the OSI model is responsible for routing?
Answer:
Explanation:
The Network Layer is responsible for determining the best path to route data from the source to the destination.
7. Which of the following is a type of guided media?
Answer:
Explanation:
Guided media involves guiding signals along a specific path like wires or cables. Coaxial cable is an example of this.
8. Which device broadcasts data to every device in a network?
Answer:
Explanation:
A hub sends data to every device in a network, irrespective of the intended recipient.
9. What is the main purpose of the OSI model?
Answer:
Explanation:
The OSI model provides a standardized framework that describes the functions of a networking or telecommunication system.
10. In which layer of the OSI model does encryption and decryption occur?
Answer:
Explanation:
The Presentation Layer is responsible for translating, encrypting, and compressing data.
11. Which protocol operates at the Transport layer of the OSI model?
Answer:
Explanation:
TCP (Transmission Control Protocol) operates at the Transport layer and ensures data is transmitted reliably between devices.
12. Which of the following is not a network topology?
Answer:
Explanation:
Array isn't a network topology. Common topologies include ring, star, bus, and mesh.
13. What does the term 'ping' mean in the context of networks?
Answer:
Explanation:
'Ping' is a network diagnostic tool used to test the connectivity between two nodes in a network.
14. Which technology allows a computer to call another computer over a phone line?
Answer:
Explanation:
A modem modulates and demodulates digital signals, allowing computers to communicate over telephone lines.
15. Which protocol is used for transferring web pages on the internet?
Answer:
Explanation:
HTTP stands for HyperText Transfer Protocol and is used to transfer web pages on the internet.
16. Which of the following network devices operates only at Layer 1 (Physical layer) of the OSI model?
Answer:
Explanation:
A hub operates at the Physical layer (Layer 1) of the OSI model and simply broadcasts data to all devices in the network.
17. What does NAT stand for in networking?
Answer:
Explanation:
NAT stands for Network Address Translator. It allows a single device, such as a router, to act as an agent between the public network and a local network, which means it can help multiple devices in a local network use a single public IP address.
18. Which network topology is best suited for a scenario where system availability is critical?
Answer:
Explanation:
In a mesh topology, every device is connected to every other device, providing multiple paths for data transmission. This redundancy means it's highly available and fault-tolerant.
19. Which layer of the OSI model deals with the creation, management, and termination of sessions?
Answer:
Explanation:
The Session Layer is responsible for setting up, maintaining, and terminating sessions between applications at both ends.
20. What kind of network attack attempts to make a machine or network resource unavailable?
Answer:
Explanation:
A Denial of Service (DoS) attack is an attempt to render a machine or network resource unavailable to users.
21. How many types of personal area networks (PANs) are there?
Answer:
Explanation:
There are two main types of PANs: Wired PAN and Wireless PAN (WPAN). Within WPAN, there are various technologies like Bluetooth, ZigBee, UWB, and IrDA, but they all fall under the wireless category.
22. What is the primary purpose of a subnet mask in IP addressing?
Answer:
Explanation:
A subnet mask is used to specify which portion of an IP address is the network and which part can be used for hosts.
23. Which protocol ensures reliable data delivery by establishing a connection?
Answer:
Explanation:
TCP (Transmission Control Protocol) ensures reliable data delivery by establishing a connection and using acknowledgments to confirm data receipt.
24. Which device operates at the Data Link Layer of the OSI model to forward data based on MAC addresses?
Answer:
Explanation:
Switches operate at the Data Link Layer (Layer 2) of the OSI model and use MAC addresses to forward data to the correct destination.
25. Which of the following is used to convert domain names into IP addresses?
Answer:
Explanation:
DNS (Domain Name System) is used to resolve domain names into IP addresses.
26. Which wireless networking protocol is limited in range but offers high transfer speeds?
Answer:
Explanation:
Bluetooth has a shorter range compared to other wireless protocols, but it can offer high transfer speeds, especially in its recent versions.
27. Which of the following topologies uses a centralized hub or switch to connect all devices?
Answer:
Explanation:
In a star topology, all devices are connected to a central hub or switch.
28. What is the standard port number for HTTP?
Answer:
Explanation:
The standard port number for HTTP (HyperText Transfer Protocol) is 80.
29. Which of the following is NOT a type of network cabling?
Answer:
Explanation:
RJ45 is a type of connector commonly used with twisted pair cables, not a type of cabling itself.
30. Which network architecture uses a peer model without dedicated servers?
Answer:
Explanation:
In a peer-to-peer network, all devices function as both clients and servers, sharing resources directly without the need for a dedicated server.
Comments
Post a Comment
Leave Comment