Computer Networking Quiz Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 2572 | Total Attempts: 9,352,619
Questions: 15 | Attempts: 829

SettingsSettingsSettings
Computer Networking Quiz Questions - Quiz

How Much do you know about Computer Networking?


Questions and Answers
  • 1. 

    What is a common method of moving files from system to system using TCP/IP?

    • A.

      Technographing

    • B.

      Amplitude Modulation

    • C.

      Decomposition

    • D.

      File Transfer Protocol

    Correct Answer
    D. File Transfer Protocol
    Explanation
    File Transfer Protocol (FTP) is a common method of moving files from system to system using TCP/IP. FTP allows users to transfer files between a client and a server over a network. It provides a simple and standard way to transfer files, allowing users to upload, download, and manage files on remote systems. FTP uses TCP/IP as the underlying protocol to establish a connection between the client and server, ensuring reliable and secure file transfers.

    Rate this question:

  • 2. 

    A 5th generation "Twisted Pair" Ethernet cable is known by what name?

    • A.

      CAT5

    • B.

      PHP5

    • C.

      WAN5

    • D.

      LAN5

    Correct Answer
    A. CAT5
    Explanation
    A 5th generation "Twisted Pair" Ethernet cable is known as CAT5.

    Rate this question:

  • 3. 

    What service translates domain names (computer hostnames) to IP addresses?

    • A.

      Telnet

    • B.

      Usenet

    • C.

      DNS

    • D.

      DSN

    Correct Answer
    C. DNS
    Explanation
    DNS (Domain Name System) is the service that translates domain names (computer hostnames) to IP addresses. It is responsible for resolving human-readable domain names into machine-readable IP addresses, allowing users to access websites and other online services using memorable domain names instead of numerical IP addresses. Telnet and Usenet are not related to translating domain names to IP addresses, while DSN (Data Source Name) is a database connection string and is also not related to DNS.

    Rate this question:

  • 4. 

    What network service is usually supported by cell phones?

    • A.

      GPRS

    • B.

      SSH

    • C.

      IRC

    • D.

      Telnet

    Correct Answer
    A. GPRS
    Explanation
    GPRS, or General Packet Radio Service, is a network service that is commonly supported by cell phones. It allows mobile devices to connect to the internet and transmit data packets, enabling activities such as web browsing, email, and instant messaging. GPRS operates on a GSM network and provides a relatively fast and efficient data connection for mobile devices. SSH, IRC, and Telnet are not typically supported by cell phones as they are more commonly used for remote access to servers or computer systems.

    Rate this question:

  • 5. 

    What computer network tool tests whether a particular host is reachable across an IP network?

    • A.

      Digg

    • B.

      DNS Lookup

    • C.

      Ping

    • D.

      Telnet

    Correct Answer
    C. Ping
    Explanation
    Ping is a computer network tool that tests whether a particular host is reachable across an IP network. It sends a small packet of data to the host and waits for a response. If the host responds, it indicates that the host is reachable. Ping is commonly used to troubleshoot network connectivity issues and measure the response time of a host.

    Rate this question:

  • 6. 

    What is the name of the device which joins multiple wired or wireless networks together?

    • A.

      Modem

    • B.

      Printer

    • C.

      Router

    • D.

      Server

    Correct Answer
    C. Router
    Explanation
    A router is a device that joins multiple wired or wireless networks together. It acts as a central hub, directing network traffic between different devices and networks. Routers are commonly used in homes and offices to connect multiple devices to the internet and enable communication between them. They determine the best path for data packets to travel, ensuring efficient and secure transmission of information. Routers also provide network security features such as firewalls and virtual private networks (VPNs).

    Rate this question:

  • 7. 

    What is the name of the software item which monitors and limits the flow of information through a computer network?

    • A.

      Firewall

    • B.

      Antivirus

    • C.

      FTP Client

    • D.

      Web Server

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a software item that monitors and limits the flow of information through a computer network. It acts as a barrier between a trusted internal network and an untrusted external network, controlling incoming and outgoing network traffic based on predetermined security rules. It helps prevent unauthorized access to or from a private network, protecting it from potential threats and attacks. Firewalls are essential in ensuring network security and maintaining the confidentiality, integrity, and availability of information within a computer network.

    Rate this question:

  • 8. 

    What is a computer's loopback IP address?

    • A.

      192.168.1.1

    • B.

      127.0.0.0

    • C.

      255.255.0.0

    • D.

      127.0.0.1

    Correct Answer
    D. 127.0.0.1
    Explanation
    The loopback IP address, 127.0.0.1, is a special address that allows a computer to send network packets to itself. It is often used for testing network software or troubleshooting network connectivity issues. When a computer sends a packet to the loopback address, it is immediately routed back to itself without going through any physical network interface. This allows programs to communicate with each other on the same machine using the network stack, even if there is no physical network connection present.

    Rate this question:

  • 9. 

    What is the name of a specially-configured subset of a larger network?

    • A.

      Portion

    • B.

      Segment

    • C.

      Piece

    • D.

      Slice

    Correct Answer
    B. Segment
    Explanation
    A segment is a specially-configured subset of a larger network. It refers to a portion of a network that is separated or divided for specific purposes, such as improving performance, security, or management. Segments are often used to isolate different departments or functions within an organization, allowing for better control and organization of network resources.

    Rate this question:

  • 10. 

    What is a name given to malicious network software designed to steal data from the computer?

    • A.

      Worm

    • B.

      Firewall

    • C.

      Trojan

    • D.

      FTP Client

    Correct Answer
    C. Trojan
    Explanation
    A Trojan is a type of malicious network software that is designed to deceive users by disguising itself as a legitimate program. Once installed, it can steal sensitive data from the computer without the user's knowledge. Unlike worms, which are self-replicating and spread without user interaction, Trojans rely on social engineering tactics to trick users into downloading and executing them. Firewalls are security measures that protect against unauthorized access, while FTP clients are software used to transfer files between a computer and a server.

    Rate this question:

  • 11. 

    What is the name of the software used to monitor network data?

    • A.

      SSH Client

    • B.

      Sniffer

    • C.

      Debugger

    • D.

      Scanner

    Correct Answer
    B. Sniffer
    Explanation
    A sniffer is a software used to monitor network data. It captures and analyzes network traffic, allowing users to view and analyze packets of data being transmitted over a network. With a sniffer, network administrators can troubleshoot network issues, detect network intrusions, and monitor network performance. It is a valuable tool for network monitoring and security purposes.

    Rate this question:

  • 12. 

    What is the word "modem" short for?

    • A.

      Modify-Demodify

    • B.

      Mode-Demonstrate

    • C.

      Modulator-Demodulator

    • D.

      Moderate-Demote

    Correct Answer
    C. Modulator-Demodulator
    Explanation
    A modem is a device that modulates and demodulates signals, allowing for the transmission of data over a communication channel. The word "modem" is short for "modulator-demodulator", which accurately describes its function. Modulation refers to the process of converting digital data into analog signals for transmission, while demodulation is the reverse process of converting analog signals back into digital data. Therefore, the correct answer is Modulator-Demodulator.

    Rate this question:

  • 13. 

    What is the maximum data rate supported by Gigabit Ethernet?

    • A.

      1000 Mbps

    • B.

      10 Mbps

    • C.

      1 Mbps

    • D.

      100 Mbps

    Correct Answer
    A. 1000 Mbps
    Explanation
    Gigabit Ethernet supports a maximum data rate of 1000 Mbps. This is because "Gigabit" refers to a data transfer rate of 1 billion bits per second, which is equivalent to 1000 Mbps.

    Rate this question:

  • 14. 

    What are two modes of data transfer supported by FTP?

    • A.

      ASCII & VISCII

    • B.

      ASCII & Binary

    • C.

      HEX & Binary

    • D.

      VISCII & Binary

    Correct Answer
    B. ASCII & Binary
    Explanation
    FTP supports two modes of data transfer: ASCII and Binary. ASCII mode is used for transferring text files, while Binary mode is used for transferring non-text files such as images, executables, and compressed files. In ASCII mode, the data is transferred as plain text, and any line breaks or special characters are converted to the appropriate format. In Binary mode, the data is transferred as-is without any modifications, preserving the integrity of the file. These two modes allow for efficient and accurate transfer of different types of files over FTP.

    Rate this question:

  • 15. 

    What is the default FTP port number?

    • A.

      23

    • B.

      24

    • C.

      21

    • D.

      22

    Correct Answer
    C. 21
    Explanation
    The default FTP port number is 21. FTP (File Transfer Protocol) is a standard network protocol used for transferring files from one host to another over a TCP-based network. The default port number for FTP is 21, which is used for establishing the control connection between the client and server. This port is reserved specifically for FTP communication and is commonly used by FTP clients and servers to establish a connection and transfer files.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 20, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.