Networking MCQ Quiz - Objective Question with Answer for Networking - Download Free PDF

Last updated on Jun 25, 2025

Networking involves the design, implementation, management, and maintenance of computer networks that enable communication and data sharing between devices. It forms the foundation of modern technology infrastructure and plays a vital role in connecting people, devices, and systems across the globe. Networking encompasses various concepts, including network protocols, network architectures, network devices, and network security. Multiple Choice Questions on networking cover topics such as network topologies, network protocols (such as TCP/IP, HTTP, and FTP), network devices (routers, switches, hubs), network addressing (IPv4, IPv6), network security measures (firewalls, VPNs), and network troubleshooting. These MCQs evaluate the understanding of networking fundamentals, network administration, network configuration, and troubleshooting techniques. Check your knowledge of the topic with the given Networking MCQs.

Latest Networking MCQ Objective Questions

Networking Question 1:

Which one of the following is a key function of a firewall?

  1. Monitoring
  2. Deleting
  3. Copying
  4. Moving
  5. Blocking Unauthorized Access

Answer (Detailed Solution Below)

Option 1 : Monitoring

Networking Question 1 Detailed Solution

Generally the firewall has two network interfaces: one for the external side of the network, one for the internal side. Its purpose is to control and monitoring what traffic is allowed to traverse from one side to the other. As the most basic level, firewalls can block traffic intended for particular IP addresses or server ports.

Networking Question 2:

Bluetooth is used for building ______. 

  1. MAN 
  2. PAN 
  3. LAN 
  4. Internet 
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : PAN 

Networking Question 2 Detailed Solution

The correct answer is PAN.

Key Points

  • Bluetooth technology is primarily used for creating Personal Area Networks (PANs).
  • A PAN is a network for interconnecting devices centered around an individual person's workspace, typically within a range of a few meters.
  • Bluetooth allows devices to communicate wirelessly, making it ideal for short-range data transfer between devices such as smartphones, tablets, and laptops.

Additional Information

  • MAN (Metropolitan Area Network): This network spans a city or a large campus. It is not typically associated with Bluetooth technology.
  • LAN (Local Area Network): This network covers a smaller geographical area, like a home, office, or building. While LANs can be wireless, Bluetooth is not commonly used to set up LANs.
  • Internet: This is a global network connecting millions of private, public, academic, business, and government networks. Bluetooth is not used to build the Internet.

Networking Question 3:

Which of the following is NOT a social media platform?

  1. PayTm
  2. Facebook
  3. Instagram
  4. Twitter
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : PayTm

Networking Question 3 Detailed Solution

The correct answer is PayTm.

  • Facebook is an American social media platform.
  • Products owned by Facebook are. Instagram, Messenger, WhatsApp, Oculus VR.
  • Facebook acquired Instagram in 2012.
  • Instagram was founded by Kevin Systrom and Mike Krieger
  • Twitter is an American social networking service provider.
    • Parent company: Odeo.​
    • Twitter was founded by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams
  • Paytm is an Indian multinational technology company that specializes in digital payment systems.
    • Hence PayTm is the answer.

Networking Question 4:

The standard suit of protocols used by the internet is:

  1. OSI
  2. HTTP
  3. SMTP
  4. TCP/IP
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : TCP/IP

Networking Question 4 Detailed Solution

The correct answer is TCP/IP.

Key Points

  • TCP/IP (Transmission Control Protocol/Internet Protocol) is the fundamental suite of protocols used for communication over the internet.
  • It defines how data should be packetized, addressed, transmitted, routed, and received at the destination.
  • TCP/IP has four layers: Network Interface, Internet, Transport, and Application layers, which help to ensure reliable communication.

Additional Information

  • OSI (Open Systems Interconnection) is a conceptual framework used to understand and implement network protocols in seven layers. It is not a protocol itself but a model used for understanding and designing a network architecture.
  • HTTP (HyperText Transfer Protocol) is an application-level protocol used for transmitting hypertext over the web. It is the foundation of data communication for the World Wide Web.
  • SMTP (Simple Mail Transfer Protocol) is a protocol used for sending emails across the internet. It is an application-level protocol used for email transmission.

Networking Question 5:

What is gateway in networking? 

  1. It provides connectivity between two or more segments
  2. It routes the data packets on network 
  3. It is used for remote access 
  4. It shows security and data logging 
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : It provides connectivity between two or more segments

Networking Question 5 Detailed Solution

The correct answer is It provides connectivity between two or more segments.

Key Points

  • A gateway in networking is a device that connects two or more network segments and acts as a translator between different network protocols. It ensures that data packets are properly routed between different network segments, enabling seamless communication.

Additional Information

  • Option 2: It routes the data packets on network - This is typically the function of a router, not a gateway. A router directs data packets between networks, whereas a gateway connects different types of networks.
  • Option 3: It is used for remote access - This is a function of remote access services or VPNs, not gateways. Remote access allows users to connect to a network from a remote location.
  • Option 4: It shows security and data logging - This is usually handled by firewalls and security appliances, not gateways. These devices monitor and log network traffic for security purposes.

Top Networking MCQ Objective Questions

The ________ layer change bits to electromagnetic signals.

  1. Data link
  2. Transport
  3. Physical
  4. Presentation

Answer (Detailed Solution Below)

Option 3 : Physical

Networking Question 6 Detailed Solution

Download Solution PDF
Correct answer is Physical.
Key Points
  • The physical layer (also known as layer 1) deals with bit-level transmission between different devices and supports electrical or mechanical .
  • This includes the layout of pins, voltages, cable specifications, hubs, repeaters, network adapters etc.
  • Physical layer is Located at the lowest layer of the Open Systems Interconnection (OSI) communications mod.
  • The Physical layer change bits to electromagnetic signals.
Additional Information
  •  A data link is a method for connecting one location to another in telecommunications, in order to transmit and receive digital information.
  • The transport layer is a 4th layer from the top. · The main role of the transport layer is to provide the communication services directly to the application.

A computer in a network that cannot be accessed outside of the local network unless given permission is called __________.

  1. Intranet
  2. Internet
  3. Middleware
  4. Modern

Answer (Detailed Solution Below)

Option 1 : Intranet

Networking Question 7 Detailed Solution

Download Solution PDF

The correct answer is option 1 i.e Intranet.

Key Points

  • A computer in a network cannot be accessed outside of the local network unless given permission is called the intranet.
    • Intranet is established mainly with the technologies for local area networks and wide area networks.
    • Larger business organizations allow users within their intranet to access public internet through firewall servers.
    • The intranet is functionally useful only for a selected group of people.
    • Comparing to the Internet, the intranet is a closed network.
    • Microsoft SharePoint, Huddle, Igloo, and Jostle are common examples of the Intranet service.
  • Additional Information 
  • The Internet is a worldwide network of computers.
    • ARPANET is considered as the ancient form of the internet.
    • Vinton Gray Cerf is recognized as "the father of the Internet",

“MAN” stands for: 

  1. Maximum Area Network
  2. Metropolitan Area Network
  3. Minimum Area Network
  4. Main Area Network

Answer (Detailed Solution Below)

Option 2 : Metropolitan Area Network

Networking Question 8 Detailed Solution

Download Solution PDF

The Correct Answer is Metropolitan Area Network.

  • A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan area.

Additional Information

A computer network is a group of computers linked to each other that enables the computer to communicate with another computer and share its resources, data, and applications.

On the basis of the size of the network it is mainly of four types:

Computer Network Types

  • LAN(Local Area Network): Local Area Network is a group of computers connected to each other in a small area such as a building, or office.
  • PAN(Personal Area Network): It is a network arranged within an individual person, typically within a range of 10 meters.
  • MAN(Metropolitan Area Network): A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network.
  • WAN(Wide Area Network): A Wide Area Network is a network that extends over a large geographical area such as states or countries.

A _________ device is used to connect multiple nodes to network.

  1. router
  2. repeater
  3. modem
  4. hub

Answer (Detailed Solution Below)

Option 4 : hub

Networking Question 9 Detailed Solution

Download Solution PDF

The correct answer is the hub.

Key Points

  • An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
  • It has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of every port except the original incoming.

Additional Information

  • Tim Berners-Lee, a British scientist, invented the World Wide Web (WWW) in 1989 while working at CERN.
  • The first web page address was http://info.cern.ch/hypertext/WWW/TheProject.html.
  • ARPANET adopted TCP/IP on January 1, 1983.
  • NCSA Mosaic ran on Windows computers was the first browser to surf the internet.

What is the full form of DHCP in networking system?

  1. Dynamic Host Configuration Protocol
  2. Dynamic Host Control Point
  3. Data Host Control Panel
  4. Display House Control Protocol

Answer (Detailed Solution Below)

Option 1 : Dynamic Host Configuration Protocol

Networking Question 10 Detailed Solution

Download Solution PDF

The correct answer is Dynamic Host Configuration Protocol.

Key Points

  • DHCP is the acronym of Dynamic Host Configuration Protocol.
  • A Dynamic Host Configuration Protocol is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices.
  • It will help to prevent duplication of addresses and also help the administrator keep good records.
  • DHCP is designed to improve the efficiency of allocating IP addresses.
  • DHCP services exist for networks running both Internet Protocol version 4 (IPv4) and  Internet Protocol version 6 (IPv6).
  • The IPv6 version of the DHCP protocol is commonly called DHCPv6.

Additional Information

  • Other common network protocols examples:
    • Address Resolution Protocol (ARP)
    • File Transfer Protocol(FTP)
    • HyperText Transfer Protocol(HTTP)
    • Post Office Protocol (POP3)
    • Simple Mail Transfer Protocol (SMTP)
    • Secure Shell Protocol (SSH)

Communication between a computer and a keyboard involves _________________ transmission.

  1. Automatic
  2. Half-duplex
  3. Full-duplex
  4. Simplex

Answer (Detailed Solution Below)

Option 4 : Simplex

Networking Question 11 Detailed Solution

Download Solution PDF

The correct answer is Simplex.

Additional Information

  • Communication between a computer and a keyboard involves simplex transmission because here data flows in a single direction.
    • Simplex transmission is a type of transmission mode. In this type of transmission mode, data can be sent only through one direction i.e. communication is unidirectional. We cannot send a message back to the sender.
    • Examples of simplex Mode is the loudspeaker, television broadcasting, television and remote, keyboard and monitor etc.
  • In half-duplex mode, each station can both transmit and receive, but not at the same time, that is, when one device is sending, the other can only receive, and vice versa. Example of Half-duplex systems: Walkie-talkies and CB (citizens band) radios.
  • In full-duplex mode, both stations can transmit and receive simultaneously. 
    • Telephone is an example of a full-duplex system.

Which of the following malicious program do not replicate automatically?

  1. Trojan Horse
  2. Virus
  3. Worm
  4. Zombie

Answer (Detailed Solution Below)

Option 1 : Trojan Horse

Networking Question 12 Detailed Solution

Download Solution PDF

The correct answer is option 1 i.e., Trojan Horse

  • Trojan Horse is a malicious program that does not replicate automatically. A user has to execute the Trojans.
  • A Trojan Horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer.
  • A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network.
  • It seeks to deceive you into loading and executing the malware on your device.

 

Malicious Program Meaning
Virus A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
Worm A computer worm is a malicious program that replicates itself in order to spread to other computers.
Zombie A zombie is a fictional character that can replicate itself.

______ is a technology that allows computers and other devices to communicate via a wireless signal.

  1. Wi-Fi
  2. Viral
  3. ZIP
  4. Wired equivalent privacy

Answer (Detailed Solution Below)

Option 1 : Wi-Fi

Networking Question 13 Detailed Solution

Download Solution PDF

The correct answer is Wi-Fi.

Key Points

  • WiFi:
    • It is suggested that wifi stands for Wireless Fidelity.
    • It is a wireless communication technology which enables computers and other devices to communicate through a wireless signal.
    • Wifi technology has coverage areas of up to 300 feet (approx.. 100 meters).
    • This means it can be used for larger distance compared to Bluetooth technology. 

Additional Information

  • Electronic gadgets enable people to communicate with each other irrespective of their geographic location and distance.
  • All technologies can be broadly classified into – wired and Wireless.
  • Wired technologies use cables whereas wireless technologies use radio frequency to enable one or more devices to communicate without any physical connections.
  • Bluetooth:
    • Bluetooth technology was created by a telecom company called Ericsson in 1994.
    • It is a wireless medium for sharing information built into electronic devices like mobile phones, Personal Digital Assistants (PDAs) etc.
    • There is no cable or modem or driver to be installed.
    • It can work in a concise range for example only within the room.
    • It a short-range wireless convergent technology.
    • It is a low-power radio technology covering a small range of distances up to 10 metres or 30 feet approx.
    • This technology has been adopted to many products such as earphones, in-car systems, printer, keyboard, and mouse.
  • Infrared:
    • It is another wireless technology that uses infrared radiation for wireless transmission between computer devices as well as many handheld remotes for TVs and video and stereo equipment.
    • Infrared adapters are installed on many laptops and smartphones.
  • Modem:
    • Modems can be wired or wireless.
    • It converts the digital signal from the computer into an analogue signal that can travel through the telephone line.
    • On the other end, this analogue signal is again converted back to digital form by the modem at the destination end.

In a ______ network, all nodes are connected to a single communication line and share it for all their communication needs.

  1. ring
  2. completely connected
  3. star
  4. Multi-access bus

Answer (Detailed Solution Below)

Option 4 : Multi-access bus

Networking Question 14 Detailed Solution

Download Solution PDF

The correct answer is Multi-access bus.

Key Points

  • In a multi-access bus network, all nodes (computers, printers, etc.) are connected to a single communication line (the bus).
  • This network type is called 'multi-access' because all nodes share and have access to the same communication line.
  • Information sent from one node travels along the bus to all other nodes on the network.
  • It is simple and less expensive to install and expand.
  • However, as the number of nodes increases, the efficiency of the network can decrease because of data collisions.

Additional Information

  • Ring Topology-
    • In Ring Topology each node connects to two other nodes and forms a single continuous pathway for signals through each node.
    • It connects the workstations in a closed loop.
    • Data is transmitted around the ring in one direction only.
    • A break in the ring causes the entire network to fail.
    • There is no signal loss in the Ring Topology.

 

 

 

  • Bus Topology-
    • In Bus Topology nodes are connected to a common half-duplex link called a bus or backbone.
    • Each workstation is connected to the next workstation in a point-to-point fashion.
    • The common implementation of this topology is Ethernet.
    • This topology is used only in comparatively small networks.

  • Star Topology- 
    • In this network, topology nodes are connected to a central hub.
    • Nodes communicate across the network by passing data through the hub.
    • Failure in one of the terminals does not affect any other terminal.
    • This network topology is used to connect terminals to a large time-sharing host computer.

  • Mesh Topology- 
    • In this network, topology devices are connected with many redundant interconnections between network nodes.
    • Failure in one of the computers does not cause the network to break down.
    • This topology is used in the critical connection of host computers.

 

A_______ is used to transfer data packets between two computer networks.

  1. Switch
  2. Router
  3. Brouter
  4. Gateway

Answer (Detailed Solution Below)

Option 2 : Router

Networking Question 15 Detailed Solution

Download Solution PDF

The correct answer is Router.

Key Points

  • A router is a networking device that forwards data packets between computer networks.
  • Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets.
  • A packet is typically forwarded from one router to another router through the networks that constitute an internet work until it reaches its destination node.
  • A router is connected to two or more data lines from different IP networks.
  • When a data packet comes in on one of the lines, the router reads the network address information in the packet header to determine the ultimate destination.
  • Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey.
  • The most familiar type of IP routers are home and small office routers that simply forward IP packets between the home computers and the Internet.
  • More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone.

Hot Links: real teen patti teen patti master real cash teen patti rich teen patti joy