Test: Computer Networking MCQ Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Alfredhook3
A
Alfredhook3
Community Contributor
Quizzes Created: 2940 | Total Attempts: 2,642,816
Questions: 20 | Attempts: 256

SettingsSettingsSettings
Test: Computer Networking MCQ Quiz - Quiz

.


Questions and Answers
  • 1. 

    Which of the following refers to IEEE standards for Gigabit Ethernet?

    • A.

      802.1

    • B.

      802.5

    • C.

      802.3z

    • D.

      802.11

    Correct Answer
    C. 802.3z
    Explanation
    802.3z refers to IEEE standards for Gigabit Ethernet. The 802.3z standard specifies the physical layer and media access control protocols for Ethernet networks operating at a data rate of 1 gigabit per second. It defines the requirements for high-speed Ethernet connections, allowing for faster data transmission and improved network performance.

    Rate this question:

  • 2. 

    What company developed 100VG-AnyLan based on IEEE 802.12 specifications?

    • A.

      Cisco Systems

    • B.

      Xerox

    • C.

      Hewlett-Packard

    • D.

      IBM

    Correct Answer
    C. Hewlett-Packard
    Explanation
    Hewlett-Packard developed 100VG-AnyLan based on IEEE 802.12 specifications.

    Rate this question:

  • 3. 

    What type of DNS record translates an IP address to a hostname?

    • A.

      CNAME

    • B.

      PTR

    • C.

      MX

    • D.

      A

    Correct Answer
    B. PTR
    Explanation
    A PTR record, also known as a Pointer record, is a type of DNS record that is used to translate an IP address to a hostname. This record is commonly used for reverse DNS lookups, where the IP address is queried to find the associated hostname. By using a PTR record, network administrators can easily identify the hostname of a specific IP address, which can be useful for various purposes such as troubleshooting network issues or verifying the legitimacy of incoming connections.

    Rate this question:

  • 4. 

    What network adapter mode captures and processes all network traffic?

    • A.

      Promiscuous Mode

    • B.

      Network Mode

    • C.

      Analysis Mode

    • D.

      Capture Mode

    Correct Answer
    A. Promiscuous Mode
    Explanation
    Promiscuous mode is a network adapter mode that captures and processes all network traffic. In this mode, the network adapter listens to all network packets, regardless of their destination, allowing the user to monitor and analyze all network activity. This mode is commonly used for network troubleshooting, packet sniffing, and network security monitoring. It enables the user to capture and analyze network packets that are not intended for their specific device, providing a comprehensive view of the network traffic.

    Rate this question:

  • 5. 

    Which standard was designed to provide high-speed serial communications using modems?

    • A.

      V.22

    • B.

      V.90

    • C.

      V.36

    • D.

      V.35

    Correct Answer
    B. V.90
    Explanation
    V.90 is the correct answer because it is a standard specifically designed to provide high-speed serial communications using modems. It was introduced in 1998 and offered a maximum download speed of 56 kbps, making it one of the fastest modem standards at the time. V.90 allowed for faster internet connections and improved data transfer rates, revolutionizing the way people accessed and shared information online.

    Rate this question:

  • 6. 

    What do switches employing the Spanning-Tree Protocol use to communicate?

    • A.

      UDPs

    • B.

      BPDUs

    • C.

      Switch Cells

    • D.

      Hello Protocol

    Correct Answer
    B. BPDUs
    Explanation
    Switches employing the Spanning-Tree Protocol use BPDUs (Bridge Protocol Data Units) to communicate. BPDUs are messages that switches send to each other to exchange information about the network topology and to determine the best path for forwarding network traffic. By exchanging BPDUs, switches can detect and prevent loops in the network, ensuring a loop-free and redundant network infrastructure.

    Rate this question:

  • 7. 

    What technology allows 24 DS0 channels to be combined into a single DS1 or T1 channel?

    • A.

      Wide Area Networking

    • B.

      Signaling Over Time

    • C.

      Time-Division Multiplexing

    • D.

      Channel-Aggregation Sequencing

    Correct Answer
    C. Time-Division Multiplexing
    Explanation
    Time-Division Multiplexing is the technology that allows 24 DS0 channels to be combined into a single DS1 or T1 channel. This technique divides the available bandwidth into multiple time slots, with each slot being assigned to a different channel. By rapidly switching between these channels, data from multiple sources can be transmitted over a single communication line, maximizing the utilization of the available bandwidth.

    Rate this question:

  • 8. 

    What does the acronym "MAN" stand for?

    • A.

      Metropolitan Area Network

    • B.

      Multi-Area Network

    • C.

      Multiple Access Network

    • D.

      Managed Access Network

    Correct Answer
    A. Metropolitan Area Network
    Explanation
    The acronym "MAN" stands for Metropolitan Area Network. A Metropolitan Area Network is a computer network that spans a larger geographic area than a local area network (LAN) but smaller than a wide area network (WAN). It typically covers a city or a metropolitan area and is used to connect various LANs and other networks within the same region.

    Rate this question:

  • 9. 

    Which networking technology uses dual counter-rotating token-passing ring networks?

    • A.

      Ethernet

    • B.

      Token Ring

    • C.

      FDDI

    • D.

      SNA

    Correct Answer
    C. FDDI
    Explanation
    FDDI (Fiber Distributed Data Interface) is the correct answer because it is a networking technology that uses dual counter-rotating token-passing ring networks. FDDI is a high-speed LAN technology that uses optical fiber to transmit data. It employs a dual-ring architecture where data is transmitted in one direction on one ring and in the opposite direction on the other ring. This dual counter-rotating ring design provides redundancy and fault tolerance, ensuring reliable data transmission.

    Rate this question:

  • 10. 

    What does "OC" stand for in an OC-3?

    • A.

      Optimal Communications

    • B.

      Optical Communications

    • C.

      Optimal Carrier

    • D.

      Optical Carrier

    Correct Answer
    D. Optical Carrier
    Explanation
    "OC" stands for "Optical Carrier" in an OC-3. The term "Optical Carrier" refers to a standardized unit of transmission capacity in fiber optic networks. In this context, OC-3 represents a specific transmission rate of 155.52 Mbps (megabits per second). The use of "Optical Carrier" highlights the use of optical fibers for transmitting data, emphasizing the technology and medium involved in the communication process.

    Rate this question:

  • 11. 

    What standard developed by Novell and Apple is similar to the NDIS specification?

    • A.

      EtherTalk

    • B.

      Open Data-link Interface (ODI)

    • C.

      IPX/SPX

    • D.

      AppleTalk

    Correct Answer
    B. Open Data-link Interface (ODI)
    Explanation
    Open Data-link Interface (ODI) is the correct answer because it was a standard developed by Novell and Apple. ODI was designed to provide a common interface for network drivers, similar to the NDIS (Network Driver Interface Specification) developed by Microsoft. It allowed different network protocols, such as IPX/SPX and AppleTalk, to be supported by the same network interface card. Therefore, ODI is similar to the NDIS specification in terms of providing a standardized interface for network drivers.

    Rate this question:

  • 12. 

    What organization is credited with developing the OSI Reference Model in 1974?

    • A.

      IEEE

    • B.

      ISO

    • C.

      ANSI

    • D.

      ITU

    Correct Answer
    B. ISO
    Explanation
    ISO, the International Organization for Standardization, is credited with developing the OSI Reference Model in 1974. The OSI (Open Systems Interconnection) Reference Model is a conceptual framework that standardizes the functions of a communication system into seven layers. ISO, being a global standard-setting organization, played a crucial role in establishing this model, which has since become a widely accepted framework for understanding and implementing network protocols.

    Rate this question:

  • 13. 

    What is another term for "physical address" on a TCP/IP network?

    • A.

      IP Address

    • B.

      MAC Address

    • C.

      Network Jack

    • D.

      Home Address

    Correct Answer
    B. MAC Address
    Explanation
    A physical address on a TCP/IP network is commonly referred to as a MAC address. MAC stands for Media Access Control, and it is a unique identifier assigned to network interfaces, such as network cards or Ethernet ports, by the manufacturer. The MAC address is used to identify and communicate with devices on a local network. Unlike an IP address, which can change, the MAC address is permanent and cannot be easily altered.

    Rate this question:

  • 14. 

    Which company installed the first commercial 3G (UMTS) wireless network?

    • A.

      AT&T

    • B.

      Verizon

    • C.

      Cisco Systems

    • D.

      Nortel

    Correct Answer
    D. Nortel
    Explanation
    Nortel installed the first commercial 3G (UMTS) wireless network.

    Rate this question:

  • 15. 

    What device essentially acts as a hub in a token ring network?

    • A.

      Router

    • B.

      MSAU

    • C.

      Ethernet Switch

    • D.

      Firewall

    Correct Answer
    B. MSAU
    Explanation
    MSAU stands for Multistation Access Unit, which is a device that essentially acts as a hub in a token ring network. It is responsible for managing the token passing process in the network, allowing devices to transmit data in a sequential manner. The MSAU also provides a central connection point for multiple devices to connect to the network. Therefore, the MSAU is the correct answer for this question.

    Rate this question:

  • 16. 

    In which type of switching is the entire packet received and checked before sending it?

    • A.

      Cut-Through

    • B.

      Store-And-Forward

    • C.

      FragmentFree

    • D.

      Low Latency

    Correct Answer
    B. Store-And-Forward
    Explanation
    Store-And-Forward switching is the type of switching where the entire packet is received and checked for errors before it is forwarded to the destination. In this method, the switch buffers the entire packet and performs a CRC (Cyclic Redundancy Check) to verify the integrity of the packet. If the packet is error-free, it is then forwarded to the destination. This method ensures that only error-free packets are transmitted, reducing the chances of data corruption or loss.

    Rate this question:

  • 17. 

    Which of the following is a public version of the Server Message Block protocol?

    • A.

      Remote Procedure Call (RPC)

    • B.

      Network File System (NFS)

    • C.

      Distributed File System (DFS)

    • D.

      Common Internet File System (CIFS)

    Correct Answer
    D. Common Internet File System (CIFS)
    Explanation
    CIFS is a public version of the Server Message Block (SMB) protocol. It is a network file-sharing protocol that allows users to access and share files and printers across a network. CIFS is commonly used in Windows operating systems and provides a way for computers to access shared resources on a remote server. It enables file and printer sharing, as well as authentication and authorization of users accessing the shared resources.

    Rate this question:

  • 18. 

    Which of the following is supported by the SOCKS Proxy Service?

    • A.

      RealAudio

    • B.

      FTP

    • C.

      Streaming Video

    • D.

      NetShow

    Correct Answer
    B. FTP
    Explanation
    The SOCKS Proxy Service supports FTP. SOCKS is a protocol that allows clients to connect to servers through a proxy server. It provides a flexible and secure way to route network traffic. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. Since the SOCKS Proxy Service is designed to handle network traffic, it is capable of supporting FTP connections.

    Rate this question:

  • 19. 

    What service was needed for Windows NT to access Novell file and print services?

    • A.

      Windows Internet Naming Service

    • B.

      Client Services For NetWare

    • C.

      Client For Microsoft Networks

    • D.

      TCP/IP

    Correct Answer
    B. Client Services For NetWare
    Explanation
    Client Services for NetWare is the correct answer because it is a service that allows Windows NT to access Novell file and print services. This service provides the necessary protocols and components to establish a connection between Windows NT and Novell servers, enabling file and print sharing functionality. It allows Windows NT to access and utilize the resources available on a Novell network, making it an essential service for integrating these two systems.

    Rate this question:

  • 20. 

    What Unix command can be used to retrieve user information over a TCP/IP network?

    • A.

      Telnet

    • B.

      Finger

    • C.

      Cron

    • D.

      Ssh

    Correct Answer
    B. Finger
    Explanation
    The Unix command "Finger" can be used to retrieve user information over a TCP/IP network. This command allows users to obtain information such as the login name, full name, home directory, and last login time of a specific user on a remote machine. It provides a simple way to gather basic information about users on a network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Alfredhook3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.