Explore topic-wise MCQs in computer networking.

This section includes 43 Mcqs, each offering curated multiple-choice questions to sharpen your computer networking knowledge and support exam preparation. Choose a topic below to get started.

1.

What does the command routerA(config)#line cons 0 allow you to perform next?

A. Set the Telnet password.
B. Shut down the router.
C. Set your console password.
D. Disable console connections.
Answer» D. Disable console connections.
2.

What does the passive command provide to dynamic routing protocols?

A. Stops an interface from sending or receiving periodic dynamic updates.
B. Stops an interface from sending periodic dynamic updates but not from receiving updates.
C. Stops the router from receiving any dynamic updates.
D. Stops the router from sending any dynamic updates.
Answer» C. Stops the router from receiving any dynamic updates.
3.

What are the two main types of access control lists (ACLs)?

1.Standard

2.IEEE

3.Extended

4.Specialized

A. 1 and 3
B. 2 and 4
C. 3 and 4
D. 1 and 2
Answer» E.
4.

When collection of various computers seems a single coherent system to its client, then it is called:

A. computer network
B. distributed system
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
5.

Which of the following networks extends a private network across public networks?

A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» C. enterprise private network
6.

The IETF standards documents are called ________

A. RFC
B. RCF
C. ID
D. DFC
Answer» B. RCF
7.

What protocols are used to configure trunking on a switch?

1.VLAN Trunking Protocol

2.VLAN

3.802.1Q

4.ISL

A. 1 and 2
B. 3 and 4
C. 1 only
D. 2 only
Answer» B. 3 and 4
8.

Which command is used to upgrade an IOS on a Cisco router?

A. copy tftp run
B. copy tftp start
C. config net
D. copy tftp flash
Answer» E.
9.

When collection of various computers seems a single coherent system to its client, then it is called _________

A. computer network
B. distributed system
C. networking system
D. mail system
Answer» C. networking system
10.

Three or more devices share a link in ________ connection.

A. Unipoint
B. Multipoint
C. Point to point
D. Simplex
Answer» C. Point to point
11.

A _________ set of rules that governs data communication.

A. Protocols
B. Standards
C. RFCs
D. Servers
Answer» B. Standards
12.

A _______ is the physical path over which a message travels.

A. Path
B. Medium
C. Protocol
D. Route
Answer» C. Protocol
13.

The first Network was called ________

A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» E.
14.

The structure or format of data is called ___________

A. Syntax
B. Semantics
C. Struct
D. Formatting
Answer» B. Semantics
15.

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________

A. Added
B. Removed
C. Rearranged
D. Modified
Answer» B. Removed
16.

Network congestion occurs _________

A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of transfer failure
Answer» B. when a system terminates
17.

A list of protocols used by a system, one protocol per layer, is called ________

A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» C. protocol suite
18.

Bluetooth is an example of __________

A. personal area network
B. local area network
C. virtual private network
D. wide area network
Answer» B. local area network
19.

A __________ is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B. firewall
C. router
D. hub
Answer» D. hub
20.

Communication channel is shared by all the machines on the network in ________

A. broadcast network
B. multicast network
C. unicast network
D. anycast network
Answer» B. multicast network
21.

In computer network nodes are _________

A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» E.
22.

Which of the following computer networks is built on the top of another network?

A. prior network
B. chief network
C. prime network
D. overlay network
Answer» E.
23.

Two devices are in network if __________

A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. a process is active and another is inactive
Answer» B. a process is running on both devices
24.

Which one of the following extends a private network across public networks?

A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» C. enterprise private network
25.

Network congestion occurs:

A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. none of the mentioned
Answer» B. when a system terminates
26.

A list of protocols used by a system, one protocol per layer, is called:

A. protocol architecture
B. protocol stack
C. protocol suit
D. none of the mentioned
Answer» C. protocol suit
27.

A _____ is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B.
C. C.
D. D.
Answer» D. D.
28.

Bluetooth is an example of:

A. personal area network
B. local area network
C.
D. D.
Answer» B. local area network
29.

Communication channel is shared by all the machines on the network in:

A. broadcast network
B. unicast network
C. multicast network
D. none of the mentioned
Answer» B. unicast network
30.

In computer network nodes are:

A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» E.
31.

Two devices are in network if:

A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned
Answer» B. a process is running on both devices
32.

Which one of the following computer network is built on the top of another network?

A. prior network
B. chief network
C. prime network
D. overlay network
Answer» E.
33.

The IETF standards documents are called:

A. RFC
B. RCF
C. ID
D. None of the mentioned
Answer» B. RCF
34.

Which transmission media has the highest transmission speed in a network?

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» D. electrical cable
35.

Three or more devices share a link in ________ connection:

A. Unipoint
B. Multipoint
C. Point to point
D. None of the mentioned
Answer» C. Point to point
36.

Which organization has authority over interstate and international commerce in the communications field?

A. ITU-T
B. IEEE
C.
D. FCC
E. ISOC
Answer» D. FCC
37.

Which of this is not a network edge device?

A. PC
B. Smartphones
C. Servers
D. Switch
Answer» E.
38.

A set of rules that governs data communication:

A. Protocols
B. Standards
C. RFCs
D. None of the mentioned
Answer» B. Standards
39.

The first Network:

A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» E.
40.

The _______ is the physical path over which a message travels:

A. Ppath
B. Medium
C. Protocol
D. Route
Answer» C. Protocol
41.

Communication between a computer and a keyboard involves ______________ transmission.

A. Automatic
B. Half-duplex
C. Full-duplex
D. Simplex
Answer» E.
42.

The structure or format of data is called:

A. Syntax
B. Semantics
C. Struct
D. None of the mentioned
Answer» B. Semantics
43.

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are:

A. Added
B. Removed
C. Rearranged
D. Modified
Answer» B. Removed