1. What does DNS stand for?
A) Dynamic Network Service
B) Domain Name System
C) Digital Network System
D) Distributed Network Service
Show Explanation
2. What is the primary function of DNS?
A) Translate domain names to IP addresses
B) Encrypt web traffic
C) Assign IP addresses to devices
D) Route network packets
Show Explanation
3. Which port does DNS primarily use?
A) Port 80
B) Port 25
C) Port 53
D) Port 443
Show Explanation
4. What does DHCP stand for?
A) Domain Host Control Protocol
B) Dynamic Host Configuration Protocol
C) Digital Host Communication Protocol
D) Distributed Host Control Protocol
Show Explanation
5. What is the primary function of DHCP?
A) Automatically assign IP addresses
B) Translate domain names to IP addresses
C) Secure network communications
D) Route network packets
Show Explanation
6. How many steps are in the DHCP process?
A) 2
B) 3
C) 4
D) 5
Show Explanation
7. What is remote logging or TELNET used for?
A) Remote access to devices
B) File transfer
C) Email communication
D) Web browsing
Show Explanation
8. Which port does TELNET use?
A) Port 21
B) Port 23
C) Port 25
D) Port 80
Show Explanation
9. Which protocol is a secure alternative to TELNET?
A) FTP
B) HTTP
C) SSH
D) SMTP
Show Explanation
10. What does SMTP stand for?
A) Simple Mail Transfer Protocol
B) Secure Mail Transport Protocol
C) Standard Mail Transfer Protocol
D) System Mail Transfer Protocol
Show Explanation
11. What is the primary function of SMTP?
A) Receiving email
B) Sending email
C) Storing email
D) Encrypting email
Show Explanation
12. Which port does SMTP use?
A) Port 21
B) Port 23
C) Port 25
D) Port 80
Show Explanation
13. What does POP3 stand for?
A) Post Office Protocol version 3
B) Protocol for Online Posting version 3
C) Public Online Protocol version 3
D) Personal Online Protocol version 3
Show Explanation
14. What does IMAP stand for?
A) Internet Mail Access Protocol
B) Internet Message Access Protocol
C) Internal Mail Access Protocol
D) Internet Mail Application Protocol
Show Explanation
15. What is the main difference between POP3 and IMAP?
A) POP3 is more secure
B) IMAP is for sending emails
C) IMAP keeps emails on the server
D) POP3 supports attachments
Show Explanation
16. What does FTP stand for?
A) File Transfer Protocol
B) Fast Transfer Protocol
C) File Transmission Protocol
D) File Transport Protocol
Show Explanation
17. Which port does FTP use for control connections?
A) Port 20
B) Port 21
C) Port 22
D) Port 23
Show Explanation
18. Which protocol is a secure alternative to FTP?
A) SFTP
B) HTTP
C) SMTP
D) TELNET
Show Explanation
19. What does WWW stand for?
A) World Wide Web Protocol
B) World Wide Web
C) World Web Wide
D) Wide World Web
Show Explanation
20. What does HTTP stand for?
A) Hypertext Transport Protocol
B) Hypertext Terminal Protocol
C) Hypertext Transfer Protocol
D) Hypertext Transmission Protocol
Show Explanation
21. Which port does HTTP use?
A) Port 80
B) Port 21
C) Port 25
D) Port 53
Show Explanation
22. What does HTTPS stand for?
A) Hypertext Transfer Protocol System
B) Hypertext Transfer Protocol Secure
C) Hypertext Transport Protocol Secure
D) Hypertext Terminal Protocol Secure
Show Explanation
23. Which port does HTTPS use?
A) Port 80
B) Port 8080
C) Port 443
D) Port 8443
Show Explanation
24. What does SNMP stand for?
A) Simple Network Management Protocol
B) Secure Network Management Protocol
C) System Network Management Protocol
D) Standard Network Management Protocol
Show Explanation
25. What is the primary function of SNMP?
A) File transfer
B) Network management and monitoring
C) Web browsing
D) Email communication
Show Explanation
26. What does IPSec stand for?
A) Internet Protocol Secure
B) IP Security Protocol
C) Internet Protocol Security
D) Internet Protection Security
Show Explanation
27. What is the primary function of IPSec?
A) Secure IP communications
B) Assign IP addresses
C) Route IP packets
D) Translate domain names
Show Explanation
28. What does VPN stand for?
A) Virtual Protocol Network
B) Virtual Private Network
C) Virtual Public Network
D) Virtual Protected Network
Show Explanation
29. What is the primary purpose of a VPN?
A) Create secure connections over public networks
B) Increase internet speed
C) Assign IP addresses
D) Translate domain names
Show Explanation
30. What is a firewall?
A) Encryption protocol
B) Authentication method
C) Network security device
D) Routing protocol
Show Explanation
31. What is the primary function of a firewall?
A) Filter network traffic
B) Encrypt data
C) Assign IP addresses
D) Translate domain names
Show Explanation
32. What is a packet-filtering firewall?
A) Examines application data
B) Examines packet headers
C) Examines user behavior
D) Examines network topology
Show Explanation
33. What is a stateful firewall?
A) Examines packet headers only
B) Examines application data
C) Tracks connection states
D) Blocks all traffic
Show Explanation
34. What is an application-level gateway?
A) Examines application-layer data
B) Examines packet headers only
C) Tracks connection states
D) Routes application traffic
Show Explanation
35. What is SSL/TLS used for?
A) File transfer
B) Secure communication
C) Network management
D) IP address assignment
Show Explanation
36. What is a digital certificate used for?
A) File encryption
B) Network routing
C) Identity verification
D) IP address assignment
Show Explanation
37. What is a Certificate Authority (CA)?
A) Issues digital certificates
B) Manages network traffic
C) Assigns IP addresses
D) Routes network packets
Show Explanation
38. What does PKI stand for?
A) Private Key Infrastructure
B) Public Key Infrastructure
C) Protected Key Infrastructure
D) Personal Key Infrastructure
Show Explanation
39. What characterizes symmetric encryption?
A) Uses different keys for encryption and decryption
B) Uses public and private keys
C) Uses the same key for encryption and decryption
D) Doesn't use keys
Show Explanation
40. What characterizes asymmetric encryption?
A) Uses different keys for encryption and decryption
B) Uses the same key for encryption and decryption
C) Doesn't use keys
D) Uses only one key
Show Explanation
41. What is a hash function?
A) Encryption algorithm
B) One-way function producing fixed-size output
C) Key generation method
D) Digital signature algorithm
Show Explanation
42. What is a digital signature used for?
A) Data encryption
B) Key exchange
C) Authentication and non-repudiation
D) Network routing
Show Explanation
43. What is a proxy server?
A) Intermediary between client and server
B) Backup server
C) Primary server
D) Authentication server
Show Explanation
44. What is a forward proxy?
A) Acts on behalf of servers
B) Acts on behalf of clients
C) Forwards all traffic
D) Blocks all traffic
Show Explanation
45. What is a reverse proxy?
A) Acts on behalf of servers
B) Acts on behalf of clients
C) Reverses all traffic
D) Blocks reverse traffic
Show Explanation
46. What is a load balancer?
A) Balances network load
B) Distributes requests across servers
C) Balances power consumption
D) Balances network traffic
Show Explanation
47. What does CDN stand for?
A) Central Data Network
B) Centralized Distribution Network
C) Content Delivery Network
D) Content Distribution Network
Show Explanation
48. What is the primary purpose of a CDN?
A) Improve content delivery speed
B) Encrypt content
C) Authenticate users
D) Route network traffic
Show Explanation
49. What is cloud computing?
A) Computing in the sky
B) On-demand access to computing resources
C) Weather prediction computing
D) Distributed computing only
Show Explanation
50. What are the three main cloud service models?
A) Public, Private, Hybrid
B) Small, Medium, Large
C) IaaS, PaaS, SaaS
D) Basic, Standard, Premium
Show Explanation