NetWo1 Reviewer-Prelim
  • 1. What is a computer network?
A) A collection of unrelated computers
B) A system for storing files offline
C) A group of devices connected to share resources
D) A software used to browse the internet
  • 2. Which of the following is NOT a key component of a network?
A) Protocols
B) Operating System
C) Devices
D) Medium
  • 3. What is the primary advantage of networking?
A) Reduces productivity
B) Increases communication and resource sharing
C) Increases software costs
D) Limits internet access
  • 4. Which of the following is an example of resource sharing?
A) Copying files manually from one device to another
B) Using a USB drive to transfer files
C) Printing from multiple devices using a single printer
D) Storing documents on a local computer
  • 5. Which protocol defines the rules for internet communication?
A) TCP/IP
B) JPEG
C) HTML
D) USB
  • 6. Which device assigns dynamic IP addresses?
A) DHCP Server
B) DNS Server
C) Router
D) Firewall
  • 7. How many bits are in an IPv4 address?
A) 128
B) 64
C) 16
D) 32
  • 8. What is the primary difference between IPv4 and IPv6?
A) IPv4 is faster than IPv6
B) IPv6 supports larger address space than IPv4
C) IPv6 only works on wireless networks
D) IPv4 supports encryption while IPv6 does not
  • 9. Which of the following is a private IP address range?
A) 8.8.8.8
B) 200.0.0.1
C) 203.0.113.10
D) 192.168.1.1
  • 10. What is the main function of NAT (Network Address Translation)?
A) Assigns MAC addresses
B) Converts private IP addresses to public IP addresses
C) Blocks unauthorized devices
D) Encrypts network traffic
  • 11. What does a firewall do?
A) Blocks unauthorized network access
B) Assigns MAC addresses
C) Converts IP addresses
D) Boosts Wi-Fi signals
  • 12. Which organization defines internet protocols?
A) IETF
B) ISO
C) W3C
D) IEEE
  • 13. What is MAC spoofing?
A) Blocking a device from the network
B) Faking a device’s MAC address
C) Encrypting network data
D) Changing an IP address
  • 14. What is the main advantage of a VPN?
A) Lower hardware costs
B) Secure, encrypted communication
C) Eliminates IP addressing
D) Faster network speeds
  • 15. What is the purpose of a proxy server?
A) Manages Bluetooth connections
B) Converts digital signals to analog
C) Assigns MAC addresses
D) Acts as an intermediary for network requests
  • 16. Which device forwards data based on MAC addresses?
A) Hub
B) Switch
C) Router
D) Modem
  • 17. What is the purpose of an access point?
A) Extends wireless network coverage
B) Assigns IP addresses
C) Encrypts data
D) Manages network security
  • 18. What does a router do?
A) Converts data into signals
B) Directs data between networks
C) Encrypts network traffic
D) Assigns MAC addresses
  • 19. Which device is commonly used to prevent unauthorized access to a network?
A) Repeater
B) Modem
C) Firewall
D) Hub
  • 20. What is a modem used for?
A) Converting digital data to analog and vice versa
B) Assigning MAC addresses
C) Storing network data
D) Filtering unauthorized traffic
  • 21. Which topology connects all devices to a central hub?
A) Bus
B) Star
C) Ring
D) Mesh
  • 22. Which topology has a single point of failure in the central cable?
A) Mesh
B) Star
C) Hybrid
D) Bus
  • 23. Which topology is best for redundancy?
A) Star
B) Bus
C) Mesh
D) Ring
  • 24. Which topology forms a loop where each device is connected to two others?
A) Star
B) Mesh
C) Bus
D) Ring
  • 25. What is a hybrid topology?
A) A network without wired connections
B) A combination of two or more topologies
C) A network that does not use a central hub
D) A topology used in data centers only
  • 26. What is the main function of a firewall?
A) Increasing network speed
B) Assigning MAC addresses
C) Filtering network traffic
D) Storing network data
  • 27. Which of the following can slow down a network?
A) Strong security
B) High bandwidth
C) High latency
D) Using fiber optics
  • 28. Which device reduces congestion by forwarding packets to specific devices?
A) Switch
B) Repeater
C) Hub
D) Router
  • 29. What does QoS (Quality of Service) do in a network?
A) Converts network signals
B) Encrypts all data
C) Prioritizes certain types of traffic
D) Assigns static IP addresses
  • 30. Which factor affects internet speed the most?
A) Signal strength
B) Device name
C) MAC address
D) File type
  • 31. What does OSI stand for?
A) Open Systems Internet
B) Online Security Integration
C) Open Systems Interconnection
D) Operational Systems Infrastructure
  • 32. How many layers are in the OSI model?
A) 6
B) 5
C) 4
D) 7
  • 33. Which layer is responsible for the physical transmission of data?
A) Transport
B) Physical
C) Data Link
D) Network
  • 34. Which layer handles routing of data between different networks?
A) Application
B) Data Link
C) Transport
D) Network
  • 35. What is the primary function of the OSI model?
A) To increase internet speed
B) To replace all other networking models
C) To encrypt all network data
D) To provide standardization for network communication
  • 36. Which layer ensures reliable communication and manages flow control?
A) Network
B) Data Link
C) Physical
D) Transport
  • 37. What is the main function of the Data Link Layer?
A) Assigning IP addresses
B) Encrypting network traffic
C) MAC addressing and error detection
D) Managing end-user applications
  • 38. Which OSI layer manages encryption and data formatting?
A) Network
B) Application
C) Transport
D) Presentation
  • 39. What is the role of the Session Layer?
A) Controls routing of packets
B) Assigns MAC addresses to devices
C) Establishes, maintains, and terminates communication sessions
D) Encrypts and compresses data
  • 40. Which layer interacts directly with end-user applications?
A) Network
B) Application
C) Transport
D) Physical
  • 41. Which protocol is used for routing at the Network Layer?
A) SMTP
B) FTP
C) IP
D) HTTP
  • 42. Which protocol is used at the Transport Layer for reliable communication?
A) UDP
B) ARP
C) TCP
D) ICMP
  • 43. Which of the following protocols is used to resolve IP addresses to MAC addresses?
A) HTTP
B) FTP
C) DNS
D) ARP
  • 44. Which layer of the OSI model is responsible for breaking data into packets?
A) Data Link
B) Application
C) Network
D) Transport
  • 45. Which of the following is a real-world application of the OSI model?
A) Managing database queries
B) Creating new programming languages
C) Diagnosing network issues
D) Designing graphics for applications
  • 46. A network that spans a larger area than a LAN, typically a city or a large campus.
A) PAN
B) VPN
C) WAN
D) MAN
E) LAN
  • 47. A network that connects devices within a limited geographic area, such as a home, office, or school.
A) PAN
B) WAN
C) VPN
D) MAN
E) LAN
  • 48. A network that spans large geographical areas, such as countries or continents.
A) LAN
B) VPN
C) WAN
D) PAN
E) MAN
  • 49. Connects devices within a short range (Bluetooth devices, personal hotspots).
A) MAN
B) LAN
C) VPN
D) PAN
E) WAN
  • 50. Creates a secure, encrypted connection over public networks for private data transmission.
A) VPN
B) MAN
C) LAN
D) WAN
E) PAN
  • 51. A simple networking device that connects multiple devices in a network but does not have the intelligence of a switch. It broadcasts incoming data to all connected devices.
A) Access Point
B) Modem
C) Switches
D) Hubs
E) Router
  • 52. This address is used to identify devices on a local network (like LANs) and ensure that data is sent to the correct destination within the network.
A) MAC Address
B) Lan Address
C) IP Address
  • 53. Develops global technical standards, including for networking
A) ISO
B) IETF
C) W3C
D) IEEE
  • 54. Defines technical standards, especially for network hardware and wireless communication.
A) IEEE
B) ISO
C) IETF
D) W3C
  • 55. A small chunk of data sent over the network. Large files are broken into multiple packets for transmission.
A) Information
B) Packets
C) Data Packets
D) Data
  • 56. A device that allows wireless devices to connect to a wired network via Wi-Fi or other wireless standards.
A) Repeater
B) Router
C) Modem
D) Access Point
E) Switches
  • 57. What is the largest example of a WAN.
A) Internet
B) SpaceX
C) Google
D) YouTube
  • 58. A type of copper cabling used in networking. It consists of pairs of wires twisted together to reduce electromagnetic interference (EMI).
A) Shielded Twisted Pair (STP)
B) Unshielded Twisted Pair (UTP)
C) Fiber Optic Cables
  • 59. similar to UTP but with an additional layer of shielding around the twisted pairs to further reduce interference.
A) Unshielded Twisted Pair (UTP)
B) Fiber Optic Cables
C) Shielded Twisted Pair (STP)
  • 60. This use light to transmit data, rather than electrical signals. They offer significantly higher bandwidth and longer transmission distances than copper cables.
A) Fiber Optic Cables
B) Shielded Twisted Pair (STP)
C) Unshielded Twisted Pair (UTP)
Students who took this test also took :

Created with That Quiz — where a math practice test is always one click away.