computer network banner

Computer Network Multiple Choice Questions (MCQs) and Answers

Master Computer Network with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Computer Network. Begin your placement preparation journey now!

Q91

Q91 What is the main advantage of using FTP over HTTP for file transfer?

A

Higher security

B

Better compression

C

Support for directory listing and manipulation

D

Faster data transfer

Q92

Q92 What mechanism does HTTP/2 use to reduce latency and improve load times compared to HTTP/1.1?

A

Data compression

B

Multiplexing

C

Encryption

D

Tokenization

Q93

Q93 How does FTP ensure data is transferred securely?

A

By using SSL/TLS for encryption

B

By compressing data

C

By using checksums for integrity

D

By using UDP

Q94

Q94 Which feature of HTTP/3 aims to improve performance over lossy or unreliable networks?

A

QUIC protocol

B

WebSocket support

C

Server Push

D

Content-Encoding

Q95

Q95 In FTP, what is the difference between binary and ASCII transfer modes?

A

Binary mode transfers files as text, while ASCII mode transfers them as binary

B

Binary mode compresses data, while ASCII mode does not

C

Binary mode transfers files in a binary format without conversion, while ASCII mode converts files between different text formats

D

Binary mode is more secure than ASCII mode

Q96

Q96 How can you download a file from an FTP server using the command line in Linux?

A

wget [FTP URL]

B

curl -O [FTP URL]

C

ftp [FTP URL]

D

scp [FTP URL]

Q97

Q97 How can you send a custom HTTP header with a curl request?

A

curl -d "[Header]" [URL]

B

curl -H "[Header]: [Value]" [URL]

C

curl --header "[Header]" [URL]

D

curl --custom-header "[Header]: [Value]" [URL]

Q98

Q98 What command allows you to interactively communicate with an HTTP server using telnet?

A

telnet [host] 80 followed by GET / HTTP/1.1

B

telnet [host] 443 followed by CONNECT / HTTP/1.1

C

telnet [host] 80 followed by POST / HTTP/1.1

D

telnet [host] 80 followed by HEAD / HTTP/1.1

Q99

Q99 If a web page is not loading correctly, what should be checked first?

A

Browser cache

B

Server configuration

C

DNS settings

D

Network connectivity

Q100

Q100 A file transfer via FTP fails with a permission error.
What is likely the cause?

A

Incorrect username or password

B

Network congestion

C

File not found on the server

D

Firewall settings

Q101

Q101 How can you diagnose slow FTP file transfers?

A

Checking file size and type

B

Analyzing network bandwidth and congestion

C

Verifying FTP server load

D

All of the above

Q102

Q102 What is the primary purpose of a firewall in network security?

A

To detect and remove viruses

B

To manage network traffic based on rules

C

To encrypt data transmissions

D

To authenticate users

Q103

Q103 Which cryptographic algorithm is commonly used for secure password storage?

A

RSA

B

AES

C

SHA-256

D

DES

Q104

Q104 What is the function of a digital certificate in network security?

A

To ensure data integrity

B

To verify the identity of entities exchanging information online

C

To compress data

D

To increase data transfer speed

Q105

Q105 What differentiates symmetric from asymmetric encryption?

A

The use of one key for encryption and a different key for decryption

B

The speed of encryption and decryption

C

The type of algorithms used

D

The use of a single key for both encryption and decryption

Q106

Q106 In the context of cryptography, what is a nonce?

A

A unique number used once

B

A method for encrypting data

C

A type of digital signature

D

A protocol for secure communication

Q107

Q107 How does a public key infrastructure (PKI) enhance network security?

A

By providing digital certificates that verify the ownership of public keys

B

By encrypting all data on the network

C

By detecting network intrusions

D

By managing network traffic

Q108

Q108 What is the primary security concern addressed by HTTPS?

A

Data corruption

B

Identity theft

C

Data interception during transmission

D

Unauthorized access to network resources

Q109

Q109 What role does the Diffie-Hellman algorithm play in cryptography?

A

It provides a method for digital signatures

B

It is used for secure password storage

C

It enables the secure exchange of encryption keys over a public channel

D

It encrypts and decrypts data

Q110

Q110 How can you generate a 2048-bit RSA key pair using OpenSSL?

A

openssl genpkey -algorithm RSA -out private_key.pem 2048

B

openssl rsa -genkey -out private_key.pem 2048

C

openssl genrsa -out private_key.pem 2048

D

openssl rsakey -create -size 2048 -out private_key.pem

Q111

Q111 What command can be used to encrypt a file using AES-256-CBC with OpenSSL?

A

openssl aes-256-cbc -in plaintext.txt -out encrypted.txt -pass pass:your_password

B

openssl encrypt -aes-256-cbc -in plaintext.txt -out encrypted.txt -k your_password

C

openssl enc -aes-256-cbc -in plaintext.txt -out encrypted.txt -k your_password

D

openssl aes-256-cbc -e -in plaintext.txt -out encrypted.txt -k your_password

Q112

Q112 If an encrypted email cannot be decrypted by the recipient, what should be checked first?

A

The email client's compatibility with the encryption standard

B

The correctness of the recipient's public key

C

The strength of the encryption algorithm

D

The sender's digital signature

Q113

Q113 How can network administrators detect and mitigate a man-in-the-middle (MitM) attack?

A

Implementing stronger encryption algorithms

B

Regularly updating firewall rules

C

Using digital certificates and HTTPS

D

Using network monitoring tools

Q114

Q114 Which frequency band is not commonly used by Wi-Fi networks?

A

2.4 GHz

B

5 GHz

C

900 MHz

D

60 GHz

Q115

Q115 What is the primary purpose of the Mobile IP protocol?

A

To secure wireless communications

B

To manage mobile device power consumption

C

To enable devices to move across networks without losing connectivity

D

To compress data for faster transmission

Q116

Q116 In the context of mobile computing, what is edge computing?

A

Processing data in a central data center

B

Storing data exclusively on the mobile device

C

Processing data near the source of data generation

D

Using cloud storage as the only data storage option

Q117

Q117 Which technology underpins the LTE (Long Term Evolution) standard for mobile communication?

A

GSM

B

CDMA

C

OFDMA

D

TDMA

Q118

Q118 How do MIMO (Multiple Input Multiple Output) technologies improve wireless network performance?

A

By encrypting data transmissions

B

By increasing the range of frequencies used

C

By using multiple antennas for transmission and reception

D

By compressing the data transmitted

Q119

Q119 What challenge does the hidden node problem pose in wireless networks?

A

Difficulty in achieving synchronization

B

Increased risk of data interception

C

Interference and collision of data transmissions

D

Excessive energy consumption

Q120

Q120 What is the main advantage of using SDN (Software Defined Networking) in wireless networks?

A

Enhanced security against cyber threats

B

Simplified hardware requirements

C

Flexible network management and configuration

D

Increased data transfer speeds

ad vertical
ad