1. What is the primary function of a firewall in network security?
A. To encrypt all network traffic.
B. To block unauthorized access to a network.
C. To speed up network performance.
D. To manage IP addresses.
2. Which IEEE standard defines Wi-Fi?
A. 802.3
B. 802.5
C. 802.11
D. 802.15
3. Which protocol is used for remote access to a server?
A. FTP
B. SMTP
C. SSH
D. HTTP
4. What is the purpose of QoS (Quality of Service)?
A. To encrypt network traffic.
B. To prioritize network traffic based on importance.
C. To increase network bandwidth.
D. To manage network security policies.
5. What is the difference between a hub and a switch?
A. A hub forwards data to all connected devices, while a switch forwards data only to the intended recipient.
B. A hub is faster than a switch.
C. A hub can manage network traffic, while a switch cannot.
D. A hub is more secure than a switch.
6. Which of the following network topologies offers the highest level of redundancy?
A. Star
B. Bus
C. Ring
D. Mesh
7. Which layer of the TCP/IP model is responsible for providing reliable data transfer between applications?
A. Network Layer
B. Transport Layer
C. Application Layer
D. Data Link Layer
8. What is the purpose of NAT (Network Address Translation)?
A. To encrypt network traffic.
B. To translate private IP addresses to public IP addresses.
C. To increase network speed.
D. To manage network devices remotely.
9. What is a MAC address?
A. A logical address assigned by a network administrator.
B. A physical address permanently assigned to a network interface card (NIC).
C. A temporary address assigned by a DHCP server.
D. An address used for routing packets across networks.
10. Which of the following is a type of network cable?
A. Coaxial cable
B. Fiber optic cable
C. Twisted pair cable
D. All of the above
11. Which of the following is a common port number for HTTP?
12. Which of the following is a type of wireless security protocol?
A. WEP
B. WPA
C. WPA2
D. All of the above
13. What is the purpose of a proxy server?
A. To encrypt network traffic.
B. To act as an intermediary between clients and servers.
C. To increase network bandwidth.
D. To manage network security policies.
14. What is the role of a DHCP relay agent?
A. To encrypt network traffic.
B. To forward DHCP requests between different networks.
C. To increase network speed.
D. To manage IP addresses.
15. What is the purpose of VLANs (Virtual LANs)?
A. To increase network speed.
B. To logically segment a network without physical separation.
C. To encrypt network traffic.
D. To manage IP addresses.
16. Which of the following is a type of network attack?
A. DDoS
B. Phishing
C. Malware
D. All of the above
17. What is the function of DNS (Domain Name System)?
A. To translate domain names into IP addresses.
B. To encrypt network traffic.
C. To manage network security.
D. To control network bandwidth.
18. What is the role of a network switch?
A. To route traffic between different networks.
B. To connect devices within the same network.
C. To provide wireless network access.
D. To encrypt network traffic.
19. What is the purpose of a VPN (Virtual Private Network)?
A. To increase network speed.
B. To create a secure, encrypted connection over a public network.
C. To manage network devices remotely.
D. To filter spam emails.
20. Which protocol is used for sending emails?
A. FTP
B. SMTP
C. HTTP
D. SNMP
21. Which of the following is a common network troubleshooting tool?
A. ping
B. traceroute
C. nslookup
D. All of the above
22. Which of the following is a common protocol used for file transfer?
A. SMTP
B. HTTP
C. FTP
D. SNMP
23. What is the function of a load balancer?
A. To encrypt network traffic.
B. To distribute network traffic across multiple servers.
C. To increase network speed.
D. To manage network security policies.
24. Which protocol is used to dynamically assign IP addresses to devices on a network?
A. DNS
B. DHCP
C. SMTP
D. FTP
25. What is the difference between TCP and UDP?
A. TCP is connection-oriented, while UDP is connectionless.
B. TCP is faster than UDP.
C. TCP is used for video streaming, while UDP is used for email.
D. TCP is more secure than UDP.
26. What is the purpose of a router?
A. To connect devices within the same network.
B. To connect different networks together.
C. To amplify network signals.
D. To provide wireless network access.
27. What is the purpose of subnetting?
A. To increase the number of available IP addresses in a network.
B. To divide a network into smaller, more manageable networks.
C. To improve the speed of data transmission across a network.
D. To encrypt network traffic for security purposes.
28. Which of the following is a private IP address range?
A. 10.0.0.0 - 10.255.255.255
B. 172.0.0.0 - 172.15.255.255
C. 192.169.0.0 - 192.169.255.255
D. 169.254.0.0 - 169.254.255.255
29. Which of the following is a common type of routing protocol?
A. OSPF
B. BGP
C. RIP
D. All of the above
30. Which layer of the OSI model is responsible for routing packets across networks?
A. Session Layer
B. Transport Layer
C. Network Layer
D. Data Link Layer