NetWo1 Reviewer-Prelim
  • 1. What is a computer network?
A) A system for storing files offline
B) A software used to browse the internet
C) A group of devices connected to share resources
D) A collection of unrelated computers
  • 2. Which of the following is NOT a key component of a network?
A) Operating System
B) Medium
C) Devices
D) Protocols
  • 3. What is the primary advantage of networking?
A) Increases communication and resource sharing
B) Increases software costs
C) Limits internet access
D) Reduces productivity
  • 4. Which of the following is an example of resource sharing?
A) Copying files manually from one device to another
B) Printing from multiple devices using a single printer
C) Using a USB drive to transfer files
D) Storing documents on a local computer
  • 5. Which protocol defines the rules for internet communication?
A) JPEG
B) USB
C) HTML
D) TCP/IP
  • 6. Which device assigns dynamic IP addresses?
A) DHCP Server
B) Firewall
C) Router
D) DNS Server
  • 7. How many bits are in an IPv4 address?
A) 16
B) 32
C) 128
D) 64
  • 8. What is the primary difference between IPv4 and IPv6?
A) IPv6 supports larger address space than IPv4
B) IPv6 only works on wireless networks
C) IPv4 supports encryption while IPv6 does not
D) IPv4 is faster than IPv6
  • 9. Which of the following is a private IP address range?
A) 192.168.1.1
B) 203.0.113.10
C) 200.0.0.1
D) 8.8.8.8
  • 10. What is the main function of NAT (Network Address Translation)?
A) Converts private IP addresses to public IP addresses
B) Encrypts network traffic
C) Blocks unauthorized devices
D) Assigns MAC addresses
  • 11. What does a firewall do?
A) Blocks unauthorized network access
B) Converts IP addresses
C) Boosts Wi-Fi signals
D) Assigns MAC addresses
  • 12. Which organization defines internet protocols?
A) IETF
B) W3C
C) IEEE
D) ISO
  • 13. What is MAC spoofing?
A) Blocking a device from the network
B) Changing an IP address
C) Encrypting network data
D) Faking a device’s MAC address
  • 14. What is the main advantage of a VPN?
A) Secure, encrypted communication
B) Lower hardware costs
C) Eliminates IP addressing
D) Faster network speeds
  • 15. What is the purpose of a proxy server?
A) Acts as an intermediary for network requests
B) Assigns MAC addresses
C) Converts digital signals to analog
D) Manages Bluetooth connections
  • 16. Which device forwards data based on MAC addresses?
A) Switch
B) Hub
C) Modem
D) Router
  • 17. What is the purpose of an access point?
A) Manages network security
B) Encrypts data
C) Extends wireless network coverage
D) Assigns IP addresses
  • 18. What does a router do?
A) Converts data into signals
B) Directs data between networks
C) Assigns MAC addresses
D) Encrypts network traffic
  • 19. Which device is commonly used to prevent unauthorized access to a network?
A) Repeater
B) Hub
C) Modem
D) Firewall
  • 20. What is a modem used for?
A) Assigning MAC addresses
B) Storing network data
C) Filtering unauthorized traffic
D) Converting digital data to analog and vice versa
  • 21. Which topology connects all devices to a central hub?
A) Mesh
B) Bus
C) Ring
D) Star
  • 22. Which topology has a single point of failure in the central cable?
A) Star
B) Hybrid
C) Mesh
D) Bus
  • 23. Which topology is best for redundancy?
A) Star
B) Mesh
C) Ring
D) Bus
  • 24. Which topology forms a loop where each device is connected to two others?
A) Star
B) Mesh
C) Ring
D) Bus
  • 25. What is a hybrid topology?
A) A network that does not use a central hub
B) A network without wired connections
C) A combination of two or more topologies
D) A topology used in data centers only
  • 26. What is the main function of a firewall?
A) Assigning MAC addresses
B) Increasing network speed
C) Filtering network traffic
D) Storing network data
  • 27. Which of the following can slow down a network?
A) Using fiber optics
B) Strong security
C) High latency
D) High bandwidth
  • 28. Which device reduces congestion by forwarding packets to specific devices?
A) Repeater
B) Switch
C) Router
D) Hub
  • 29. What does QoS (Quality of Service) do in a network?
A) Encrypts all data
B) Prioritizes certain types of traffic
C) Assigns static IP addresses
D) Converts network signals
  • 30. Which factor affects internet speed the most?
A) Device name
B) Signal strength
C) File type
D) MAC address
  • 31. What does OSI stand for?
A) Open Systems Interconnection
B) Online Security Integration
C) Open Systems Internet
D) Operational Systems Infrastructure
  • 32. How many layers are in the OSI model?
A) 4
B) 6
C) 5
D) 7
  • 33. Which layer is responsible for the physical transmission of data?
A) Physical
B) Transport
C) Network
D) Data Link
  • 34. Which layer handles routing of data between different networks?
A) Application
B) Transport
C) Data Link
D) Network
  • 35. What is the primary function of the OSI model?
A) To encrypt all network data
B) To increase internet speed
C) To provide standardization for network communication
D) To replace all other networking models
  • 36. Which layer ensures reliable communication and manages flow control?
A) Physical
B) Network
C) Transport
D) Data Link
  • 37. What is the main function of the Data Link Layer?
A) Encrypting network traffic
B) Assigning IP addresses
C) Managing end-user applications
D) MAC addressing and error detection
  • 38. Which OSI layer manages encryption and data formatting?
A) Transport
B) Network
C) Presentation
D) Application
  • 39. What is the role of the Session Layer?
A) Assigns MAC addresses to devices
B) Controls routing of packets
C) Establishes, maintains, and terminates communication sessions
D) Encrypts and compresses data
  • 40. Which layer interacts directly with end-user applications?
A) Physical
B) Transport
C) Application
D) Network
  • 41. Which protocol is used for routing at the Network Layer?
A) IP
B) FTP
C) SMTP
D) HTTP
  • 42. Which protocol is used at the Transport Layer for reliable communication?
A) ARP
B) UDP
C) TCP
D) ICMP
  • 43. Which of the following protocols is used to resolve IP addresses to MAC addresses?
A) DNS
B) FTP
C) HTTP
D) ARP
  • 44. Which layer of the OSI model is responsible for breaking data into packets?
A) Transport
B) Data Link
C) Network
D) Application
  • 45. Which of the following is a real-world application of the OSI model?
A) Managing database queries
B) Creating new programming languages
C) Diagnosing network issues
D) Designing graphics for applications
  • 46. A network that spans a larger area than a LAN, typically a city or a large campus.
A) PAN
B) WAN
C) VPN
D) MAN
E) LAN
  • 47. A network that connects devices within a limited geographic area, such as a home, office, or school.
A) WAN
B) VPN
C) MAN
D) LAN
E) PAN
  • 48. A network that spans large geographical areas, such as countries or continents.
A) MAN
B) WAN
C) LAN
D) VPN
E) PAN
  • 49. Connects devices within a short range (Bluetooth devices, personal hotspots).
A) PAN
B) LAN
C) WAN
D) VPN
E) MAN
  • 50. Creates a secure, encrypted connection over public networks for private data transmission.
A) VPN
B) WAN
C) MAN
D) LAN
E) PAN
  • 51. A simple networking device that connects multiple devices in a network but does not have the intelligence of a switch. It broadcasts incoming data to all connected devices.
A) Switches
B) Router
C) Hubs
D) Access Point
E) Modem
  • 52. This address is used to identify devices on a local network (like LANs) and ensure that data is sent to the correct destination within the network.
A) IP Address
B) Lan Address
C) MAC Address
  • 53. Develops global technical standards, including for networking
A) IEEE
B) W3C
C) ISO
D) IETF
  • 54. Defines technical standards, especially for network hardware and wireless communication.
A) ISO
B) IEEE
C) W3C
D) IETF
  • 55. A small chunk of data sent over the network. Large files are broken into multiple packets for transmission.
A) Packets
B) Data Packets
C) Information
D) Data
  • 56. A device that allows wireless devices to connect to a wired network via Wi-Fi or other wireless standards.
A) Switches
B) Router
C) Repeater
D) Access Point
E) Modem
  • 57. What is the largest example of a WAN.
A) Google
B) Internet
C) SpaceX
D) YouTube
  • 58. A type of copper cabling used in networking. It consists of pairs of wires twisted together to reduce electromagnetic interference (EMI).
A) Unshielded Twisted Pair (UTP)
B) Shielded Twisted Pair (STP)
C) Fiber Optic Cables
  • 59. similar to UTP but with an additional layer of shielding around the twisted pairs to further reduce interference.
A) Unshielded Twisted Pair (UTP)
B) Shielded Twisted Pair (STP)
C) Fiber Optic Cables
  • 60. This use light to transmit data, rather than electrical signals. They offer significantly higher bandwidth and longer transmission distances than copper cables.
A) Unshielded Twisted Pair (UTP)
B) Fiber Optic Cables
C) Shielded Twisted Pair (STP)
Students who took this test also took :

Created with That Quiz — where a math practice test is always one click away.