NetWo1 Reviewer-Prelim
  • 1. What is a computer network?
A) A system for storing files offline
B) A software used to browse the internet
C) A group of devices connected to share resources
D) A collection of unrelated computers
  • 2. Which of the following is NOT a key component of a network?
A) Protocols
B) Medium
C) Operating System
D) Devices
  • 3. What is the primary advantage of networking?
A) Increases software costs
B) Increases communication and resource sharing
C) Limits internet access
D) Reduces productivity
  • 4. Which of the following is an example of resource sharing?
A) Copying files manually from one device to another
B) Printing from multiple devices using a single printer
C) Using a USB drive to transfer files
D) Storing documents on a local computer
  • 5. Which protocol defines the rules for internet communication?
A) HTML
B) TCP/IP
C) USB
D) JPEG
  • 6. Which device assigns dynamic IP addresses?
A) DHCP Server
B) Router
C) Firewall
D) DNS Server
  • 7. How many bits are in an IPv4 address?
A) 16
B) 128
C) 64
D) 32
  • 8. What is the primary difference between IPv4 and IPv6?
A) IPv6 supports larger address space than IPv4
B) IPv6 only works on wireless networks
C) IPv4 is faster than IPv6
D) IPv4 supports encryption while IPv6 does not
  • 9. Which of the following is a private IP address range?
A) 203.0.113.10
B) 192.168.1.1
C) 8.8.8.8
D) 200.0.0.1
  • 10. What is the main function of NAT (Network Address Translation)?
A) Blocks unauthorized devices
B) Assigns MAC addresses
C) Encrypts network traffic
D) Converts private IP addresses to public IP addresses
  • 11. What does a firewall do?
A) Converts IP addresses
B) Assigns MAC addresses
C) Blocks unauthorized network access
D) Boosts Wi-Fi signals
  • 12. Which organization defines internet protocols?
A) ISO
B) IETF
C) IEEE
D) W3C
  • 13. What is MAC spoofing?
A) Encrypting network data
B) Faking a device’s MAC address
C) Blocking a device from the network
D) Changing an IP address
  • 14. What is the main advantage of a VPN?
A) Faster network speeds
B) Eliminates IP addressing
C) Lower hardware costs
D) Secure, encrypted communication
  • 15. What is the purpose of a proxy server?
A) Converts digital signals to analog
B) Assigns MAC addresses
C) Manages Bluetooth connections
D) Acts as an intermediary for network requests
  • 16. Which device forwards data based on MAC addresses?
A) Switch
B) Router
C) Modem
D) Hub
  • 17. What is the purpose of an access point?
A) Manages network security
B) Assigns IP addresses
C) Extends wireless network coverage
D) Encrypts data
  • 18. What does a router do?
A) Converts data into signals
B) Encrypts network traffic
C) Directs data between networks
D) Assigns MAC addresses
  • 19. Which device is commonly used to prevent unauthorized access to a network?
A) Firewall
B) Modem
C) Hub
D) Repeater
  • 20. What is a modem used for?
A) Converting digital data to analog and vice versa
B) Filtering unauthorized traffic
C) Storing network data
D) Assigning MAC addresses
  • 21. Which topology connects all devices to a central hub?
A) Bus
B) Ring
C) Star
D) Mesh
  • 22. Which topology has a single point of failure in the central cable?
A) Star
B) Bus
C) Mesh
D) Hybrid
  • 23. Which topology is best for redundancy?
A) Ring
B) Star
C) Bus
D) Mesh
  • 24. Which topology forms a loop where each device is connected to two others?
A) Star
B) Mesh
C) Ring
D) Bus
  • 25. What is a hybrid topology?
A) A topology used in data centers only
B) A combination of two or more topologies
C) A network without wired connections
D) A network that does not use a central hub
  • 26. What is the main function of a firewall?
A) Filtering network traffic
B) Increasing network speed
C) Assigning MAC addresses
D) Storing network data
  • 27. Which of the following can slow down a network?
A) Strong security
B) Using fiber optics
C) High bandwidth
D) High latency
  • 28. Which device reduces congestion by forwarding packets to specific devices?
A) Hub
B) Switch
C) Repeater
D) Router
  • 29. What does QoS (Quality of Service) do in a network?
A) Assigns static IP addresses
B) Converts network signals
C) Encrypts all data
D) Prioritizes certain types of traffic
  • 30. Which factor affects internet speed the most?
A) MAC address
B) File type
C) Device name
D) Signal strength
  • 31. What does OSI stand for?
A) Open Systems Internet
B) Online Security Integration
C) Operational Systems Infrastructure
D) Open Systems Interconnection
  • 32. How many layers are in the OSI model?
A) 4
B) 6
C) 5
D) 7
  • 33. Which layer is responsible for the physical transmission of data?
A) Network
B) Physical
C) Transport
D) Data Link
  • 34. Which layer handles routing of data between different networks?
A) Data Link
B) Network
C) Transport
D) Application
  • 35. What is the primary function of the OSI model?
A) To replace all other networking models
B) To increase internet speed
C) To encrypt all network data
D) To provide standardization for network communication
  • 36. Which layer ensures reliable communication and manages flow control?
A) Physical
B) Transport
C) Data Link
D) Network
  • 37. What is the main function of the Data Link Layer?
A) Assigning IP addresses
B) Managing end-user applications
C) MAC addressing and error detection
D) Encrypting network traffic
  • 38. Which OSI layer manages encryption and data formatting?
A) Presentation
B) Network
C) Application
D) Transport
  • 39. What is the role of the Session Layer?
A) Controls routing of packets
B) Assigns MAC addresses to devices
C) Encrypts and compresses data
D) Establishes, maintains, and terminates communication sessions
  • 40. Which layer interacts directly with end-user applications?
A) Transport
B) Physical
C) Application
D) Network
  • 41. Which protocol is used for routing at the Network Layer?
A) IP
B) FTP
C) HTTP
D) SMTP
  • 42. Which protocol is used at the Transport Layer for reliable communication?
A) ARP
B) ICMP
C) UDP
D) TCP
  • 43. Which of the following protocols is used to resolve IP addresses to MAC addresses?
A) DNS
B) ARP
C) FTP
D) HTTP
  • 44. Which layer of the OSI model is responsible for breaking data into packets?
A) Transport
B) Data Link
C) Application
D) Network
  • 45. Which of the following is a real-world application of the OSI model?
A) Diagnosing network issues
B) Creating new programming languages
C) Managing database queries
D) Designing graphics for applications
  • 46. A network that spans a larger area than a LAN, typically a city or a large campus.
A) MAN
B) WAN
C) VPN
D) PAN
E) LAN
  • 47. A network that connects devices within a limited geographic area, such as a home, office, or school.
A) PAN
B) WAN
C) VPN
D) MAN
E) LAN
  • 48. A network that spans large geographical areas, such as countries or continents.
A) PAN
B) MAN
C) VPN
D) WAN
E) LAN
  • 49. Connects devices within a short range (Bluetooth devices, personal hotspots).
A) PAN
B) MAN
C) VPN
D) LAN
E) WAN
  • 50. Creates a secure, encrypted connection over public networks for private data transmission.
A) MAN
B) WAN
C) PAN
D) LAN
E) VPN
  • 51. A simple networking device that connects multiple devices in a network but does not have the intelligence of a switch. It broadcasts incoming data to all connected devices.
A) Modem
B) Hubs
C) Access Point
D) Router
E) Switches
  • 52. This address is used to identify devices on a local network (like LANs) and ensure that data is sent to the correct destination within the network.
A) IP Address
B) MAC Address
C) Lan Address
  • 53. Develops global technical standards, including for networking
A) ISO
B) IETF
C) W3C
D) IEEE
  • 54. Defines technical standards, especially for network hardware and wireless communication.
A) ISO
B) IEEE
C) IETF
D) W3C
  • 55. A small chunk of data sent over the network. Large files are broken into multiple packets for transmission.
A) Data Packets
B) Packets
C) Data
D) Information
  • 56. A device that allows wireless devices to connect to a wired network via Wi-Fi or other wireless standards.
A) Router
B) Modem
C) Access Point
D) Repeater
E) Switches
  • 57. What is the largest example of a WAN.
A) Internet
B) SpaceX
C) Google
D) YouTube
  • 58. A type of copper cabling used in networking. It consists of pairs of wires twisted together to reduce electromagnetic interference (EMI).
A) Shielded Twisted Pair (STP)
B) Fiber Optic Cables
C) Unshielded Twisted Pair (UTP)
  • 59. similar to UTP but with an additional layer of shielding around the twisted pairs to further reduce interference.
A) Unshielded Twisted Pair (UTP)
B) Fiber Optic Cables
C) Shielded Twisted Pair (STP)
  • 60. This use light to transmit data, rather than electrical signals. They offer significantly higher bandwidth and longer transmission distances than copper cables.
A) Unshielded Twisted Pair (UTP)
B) Fiber Optic Cables
C) Shielded Twisted Pair (STP)
Students who took this test also took :

Created with That Quiz — where a math practice test is always one click away.