1Which of the following best describes a Computer Network?
A.A single computer processing data
B.A collection of computers connected to share resources
C.A software used to browse the internet
D.A storage device used for backup
Correct Answer: A collection of computers connected to share resources
Explanation:A computer network is a set of computers connected together for the purpose of sharing resources such as files, printers, and internet access.
Incorrect! Try again.
2Which network type typically covers a small geographic area like a single room or a building?
A.WAN (Wide Area Network)
B.MAN (Metropolitan Area Network)
C.LAN (Local Area Network)
D.VPN (Virtual Private Network)
Correct Answer: LAN (Local Area Network)
Explanation:A LAN (Local Area Network) connects computers within a limited area such as a residence, school, laboratory, university campus, or office building.
Incorrect! Try again.
3The Internet is the largest example of which type of network?
A.LAN
B.PAN
C.WAN
D.MAN
Correct Answer: WAN
Explanation:The Internet is the ultimate Wide Area Network (WAN), spanning the entire globe.
Incorrect! Try again.
4Which network topology connects all devices to a single central cable called the backbone?
A.Star Topology
B.Bus Topology
C.Ring Topology
D.Mesh Topology
Correct Answer: Bus Topology
Explanation:In a Bus topology, all nodes are connected to a single central cable (the backbone). If the backbone breaks, the whole network fails.
Incorrect! Try again.
5In which topology are all computers connected to a central device like a hub or a switch?
A.Bus
B.Ring
C.Star
D.Mesh
Correct Answer: Star
Explanation:In a Star topology, every node connects to a central network device (hub or switch), which manages the data flow.
Incorrect! Try again.
6Which network topology provides the highest level of redundancy and reliability by connecting every device to every other device?
A.Star
B.Tree
C.Mesh
D.Bus
Correct Answer: Mesh
Explanation:A full Mesh topology connects every device to every other device, ensuring that if one link fails, data can take an alternative path.
Incorrect! Try again.
7What is the primary function of a Router?
A.To connect devices within a single LAN
B.To modulate and demodulate signals
C.To direct data packets between different networks
D.To power the computer system
Correct Answer: To direct data packets between different networks
Explanation:Routers are designed to connect multiple networks together and route traffic (data packets) between them based on IP addresses.
Incorrect! Try again.
8Which device is used to convert digital signals from a computer into analog signals for transmission over telephone lines?
A.Switch
B.Router
C.Modem
D.Hub
Correct Answer: Modem
Explanation:A Modem (Modulator-Demodulator) converts digital data into analog signals for transmission and vice versa.
Incorrect! Try again.
9Which networking device is known as a 'dumb' device because it broadcasts data to all connected ports?
A.Router
B.Switch
C.Hub
D.Firewall
Correct Answer: Hub
Explanation:A Hub broadcasts incoming data packets to all connected ports regardless of the destination, making it less efficient and less secure than a switch.
Incorrect! Try again.
10How does a Switch differ from a Hub?
A.A switch is wireless only
B.A switch sends data only to the specific destination device
C.A switch connects different networks like the internet
D.A switch cannot connect multiple computers
Correct Answer: A switch sends data only to the specific destination device
Explanation:Unlike a hub, a switch is intelligent; it uses MAC addresses to send data only to the intended recipient port.
Incorrect! Try again.
11Which device allows wireless devices to connect to a wired network?
A.Modem
B.Access Point (AP)
C.Network Interface Card (NIC)
D.Server
Correct Answer: Access Point (AP)
Explanation:A Wireless Access Point (WAP or AP) allows Wi-Fi devices to connect to a wired network.
Incorrect! Try again.
12In the Client-Server model, what is the role of the 'Client'?
A.To store all the data and manage permissions
B.To request services or resources
C.To route traffic between networks
D.To provide security against viruses
Correct Answer: To request services or resources
Explanation:In the Client-Server architecture, the client is the device or software that initiates requests for services or resources from the server.
Incorrect! Try again.
13Which of the following is a characteristic of a Server?
A.It usually has lower processing power than a client
B.It requests data from other computers
C.It provides resources and services to clients
D.It is only used for gaming
Correct Answer: It provides resources and services to clients
Explanation:Servers are powerful computers designed to manage network resources and fulfill requests from client computers.
Incorrect! Try again.
14What is 'Malware' short for?
A.Malfunction Software
B.Malicious Hardware
C.Malicious Software
D.Manual Software
Correct Answer: Malicious Software
Explanation:Malware stands for Malicious Software, which encompasses various types of harmful programs.
Incorrect! Try again.
15Which type of malware attaches itself to a legitimate program and requires human action to spread?
A.Worm
B.Virus
C.Adware
D.Botnet
Correct Answer: Virus
Explanation:A computer virus attaches itself to a host program or file and requires a user to execute the file to activate and spread.
Incorrect! Try again.
16Which malware is self-replicating and spreads across networks without requiring a host file or user interaction?
A.Virus
B.Trojan Horse
C.Worm
D.Spyware
Correct Answer: Worm
Explanation:A computer worm is a standalone malware program that replicates itself in order to spread to other computers, usually via a network.
Incorrect! Try again.
17What is a Trojan Horse in the context of computing?
A.A hardware device for racing
B.Malware disguised as legitimate software
C.A type of antivirus
D.A fast network cable
Correct Answer: Malware disguised as legitimate software
Explanation:A Trojan Horse appears to be useful or legitimate software but contains hidden malicious code that activates once installed.
Incorrect! Try again.
18Which type of malware encrypts a user's files and demands payment for the decryption key?
A.Spyware
B.Ransomware
C.Adware
D.Worm
Correct Answer: Ransomware
Explanation:Ransomware blocks access to a computer system or encrypts data until a sum of money (ransom) is paid.
Incorrect! Try again.
19Software that secretly monitors user activity and collects information without their knowledge is called:
A.Spyware
B.Firewall
C.Firmware
D.Freeware
Correct Answer: Spyware
Explanation:Spyware is designed to gather information about a person or organization without their knowledge, often tracking keystrokes or browsing habits.
Incorrect! Try again.
20What is Phishing?
A.Scanning a hard drive for errors
B.Connecting to a Wi-Fi network
C.Sending fraudulent emails to trick users into revealing sensitive info
D.Installing a firewall
Correct Answer: Sending fraudulent emails to trick users into revealing sensitive info
Explanation:Phishing involves sending fraudulent communications that appear to come from a reputable source to steal sensitive data like passwords or credit card numbers.
Incorrect! Try again.
21Which attack method involves trying every possible combination of characters to guess a password?
A.Phishing
B.Dictionary Attack
C.Brute Force Attack
D.SQL Injection
Correct Answer: Brute Force Attack
Explanation:A Brute Force attack involves an automated system attempting every possible combination of letters, numbers, and symbols to crack a password.
Incorrect! Try again.
22What does MFA stand for in computer security?
A.Multiple File Access
B.Main Factor Authorization
C.Multi-Factor Authentication
D.Master File Allocation
Correct Answer: Multi-Factor Authentication
Explanation:MFA stands for Multi-Factor Authentication, a security system that requires more than one method of authentication to verify the user's identity.
Incorrect! Try again.
23Which of the following is an example of 'Something you are' in Multi-Factor Authentication?
A.Password
B.Smart Card
C.Fingerprint
D.PIN code
Correct Answer: Fingerprint
Explanation:'Something you are' refers to biometrics, such as fingerprints, facial recognition, or iris scans.
Incorrect! Try again.
24Which user account type typically has full control over the computer, including installing software and changing settings?
A.Guest
B.Standard User
C.Administrator
D.Limited User
Correct Answer: Administrator
Explanation:An Administrator account has the highest level of privileges and can make system-wide changes, install software, and manage other accounts.
Incorrect! Try again.
25What is a primary limitation of a Guest account?
A.It has unlimited internet speed
B.It cannot install software or change system settings
C.It can access all files on the hard drive
D.It does not require a monitor
Correct Answer: It cannot install software or change system settings
Explanation:Guest accounts are designed for temporary access and are restricted from making permanent changes or accessing other users' files.
Incorrect! Try again.
26What is a Firewall?
A.A physical wall in a server room
B.A security system that monitors and controls network traffic
C.A type of virus that burns hardware
D.A tool to clean computer fans
Correct Answer: A security system that monitors and controls network traffic
Explanation:A firewall is a network security device (hardware or software) that monitors incoming and outgoing network traffic and decides whether to allow or block it based on security rules.
Incorrect! Try again.
27Which network topology connects devices in a closed loop?
A.Bus
B.Ring
C.Star
D.Tree
Correct Answer: Ring
Explanation:In a Ring topology, each device is connected to two other devices, forming a continuous circle or closed loop for data traffic.
Incorrect! Try again.
28Which device operates at the Data Link Layer and uses MAC addresses?
A.Hub
B.Switch
C.Repeater
D.Cable
Correct Answer: Switch
Explanation:Switches operate at the Data Link Layer (Layer 2) of the OSI model and make decisions based on physical MAC addresses.
Incorrect! Try again.
29Bluetooth is an example of which type of network?
A.WAN
B.LAN
C.PAN (Personal Area Network)
D.MAN
Correct Answer: PAN (Personal Area Network)
Explanation:PAN (Personal Area Network) is used for data transmission among devices such as computers, telephones, and tablets closely surrounding a single person (e.g., Bluetooth).
Incorrect! Try again.
30In a network, what does the term 'Node' refer to?
A.Only the server
B.The network cable
C.Any device connected to the network
D.The speed of the internet
Correct Answer: Any device connected to the network
Explanation:A node is any physical device (computer, printer, router, etc.) connected to a network that can send, receive, or process data.
Incorrect! Try again.
31What is the main disadvantage of a Hub compared to a Switch?
Explanation:Because hubs broadcast data to all ports rather than just the destination, they create collision domains and unnecessary traffic, reducing performance.
Incorrect! Try again.
32Which form of malware captures keystrokes to steal passwords?
A.Keylogger
B.Adware
C.Ransomware
D.Logic Bomb
Correct Answer: Keylogger
Explanation:A Keylogger is a specific type of spyware that records every keystroke made by the user, often used to steal credentials.
Incorrect! Try again.
33What is the 'Dictionary Attack' method of password cracking?
A.Guessing based on user's birthday
B.Using a pre-defined list of common words and passwords
C.Encrypting the password file
D.Asking the user for the password
Correct Answer: Using a pre-defined list of common words and passwords
Explanation:A Dictionary Attack uses a wordlist (dictionary) of common words and passwords to try and guess the correct credential.
Incorrect! Try again.
34Which account type allows a user to use the computer for daily tasks but prevents accidental system damage?
A.Administrator
B.Standard User
C.Hacker
D.Root
Correct Answer: Standard User
Explanation:A Standard User account allows use of most software and internet access but restricts administrative tasks like installing system-wide apps, enhancing security.
Incorrect! Try again.
35What is 'Spear Phishing'?
A.Fishing for underwater cables
B.A phishing attack targeting a specific individual or organization
C.Sending spam to random people
D.Hacking a website
Correct Answer: A phishing attack targeting a specific individual or organization
Explanation:Unlike generic phishing, Spear Phishing is highly targeted and personalized to a specific victim or organization to increase credibility.
Incorrect! Try again.
36Which authentication factor falls under 'Something you have'?
A.Password
B.Retina Scan
C.Security Token or Smartphone
D.Voice recognition
Correct Answer: Security Token or Smartphone
Explanation:'Something you have' refers to a physical object the user possesses, such as a phone (for SMS codes), a smart card, or a hardware token.
Incorrect! Try again.
37Which network topology is a combination of two or more different topologies?
A.Star
B.Bus
C.Hybrid
D.Ring
Correct Answer: Hybrid
Explanation:A Hybrid topology is created when two or more different network topologies (e.g., Star and Bus) are interconnected.
Incorrect! Try again.
38Which device is considered the 'gateway' to the internet for a home network?
A.Switch
B.Router
C.Hub
D.Printer
Correct Answer: Router
Explanation:The Router acts as the gateway, routing traffic between the local home network (LAN) and the internet (WAN).
Incorrect! Try again.
39A 'Botnet' is usually created using which type of malware?
A.Trojan/Worm
B.Adware
C.Spyware
D.Ransomware
Correct Answer: Trojan/Worm
Explanation:Botnets are networks of infected computers (zombies) controlled remotely, often infected via Trojans or Worms.
Incorrect! Try again.
40The physical arrangement of devices in a network is known as:
A.Network Protocol
B.Network Architecture
C.Network Topology
D.Network Class
Correct Answer: Network Topology
Explanation:Network Topology refers to the physical or logical layout of the devices and connections in a network.
Incorrect! Try again.
41Which of the following is NOT a type of computer network?
A.LAN
B.WAN
C.FAN (Fan Area Network)
D.MAN
Correct Answer: FAN (Fan Area Network)
Explanation:LAN, WAN, and MAN are standard network types. FAN is not a standard computer networking term in this context.
Incorrect! Try again.
42What is the main purpose of a firewall blocking 'Incoming' traffic?
A.To stop employees from using Facebook
B.To prevent unauthorized access from the internet
C.To speed up the internet
D.To save electricity
Correct Answer: To prevent unauthorized access from the internet
Explanation:Inbound firewall rules are primarily designed to stop hackers and malicious software on the internet from initiating connections to your computer.
Incorrect! Try again.
43In a Tree Topology, the network is arranged in what kind of structure?
A.Circular
B.Hierarchical
C.Linear
D.Random
Correct Answer: Hierarchical
Explanation:A Tree topology has a root node and all other nodes are connected in a hierarchical, parent-child manner.
Incorrect! Try again.
44Which of the following is a strong password practice?
A.Using 'password123'
B.Using the same password for all sites
C.Using a mix of letters, numbers, and symbols
D.Writing it on a sticky note on the monitor
Correct Answer: Using a mix of letters, numbers, and symbols
Explanation:Strong passwords should be complex (mixing character types) and unique to make them harder to crack.
Incorrect! Try again.
45Adware is primarily designed to:
A.Destroy hardware
B.Encrypt files
C.Display unwanted advertisements
D.Replicate itself to other networks
Correct Answer: Display unwanted advertisements
Explanation:Adware (Advertising-supported software) is designed to automatically generate advertisements on the screen, often generating revenue for the developer.
Incorrect! Try again.
46Which privileges should be granted to a normal employee to ensure security (Principle of Least Privilege)?
A.Administrator
B.Standard User
C.Guest
D.Root
Correct Answer: Standard User
Explanation:Standard User privileges allow employees to do their work without the risk of modifying critical system settings, adhering to the Principle of Least Privilege.
Incorrect! Try again.
47A 'man-in-the-middle' attack is a threat where:
A.A hacker physically sits between two computers
B.An attacker intercepts communication between two parties
C.The server shuts down
D.A virus deletes the operating system
Correct Answer: An attacker intercepts communication between two parties
Explanation:In a Man-in-the-Middle (MitM) attack, the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Incorrect! Try again.
48Which device enables a computer to connect to a telephone line for dial-up internet?
A.Router
B.Modem
C.Switch
D.Access Point
Correct Answer: Modem
Explanation:A Dial-up Modem translates digital computer signals into audio signals that can travel over standard telephone lines.
Incorrect! Try again.
49What is the best way to protect against data loss from Ransomware?
A.Using a strong password
B.Regular offline backups
C.Using Incognito mode
D.Installing a faster processor
Correct Answer: Regular offline backups
Explanation:While antivirus helps prevent infection, the only guaranteed way to recover data encrypted by ransomware without paying is to restore from a clean, offline backup.
Incorrect! Try again.
50In a Star topology, if the central Hub fails, what happens?
A.Only one computer fails
B.The entire network fails
C.Data finds another path
D.The computers communicate directly
Correct Answer: The entire network fails
Explanation:The central device (Hub/Switch) is a single point of failure in a Star topology. If it breaks, no devices can communicate.
Incorrect! Try again.
Give Feedback
Help us improve by sharing your thoughts or reporting issues.