Computer Networks MCQs (Part-12)

Which of the following techniques is used to distribute traffic evenly across multiple servers to avoid overloading a single server?

A Traffic shaping
B Network routing
C Load balancing
D Network segmentation

What is the primary goal of network performance optimization?

A Reducing network costs
B Increasing packet loss
C Maximizing throughput
D Increasing latency

Which of the following is a key aspect of cybersecurity in networking to protect against unauthorized access?

A Data encryption
B Network segmentation
C Load balancing
D Firewall configuration

What type of attack aims to overwhelm a networkโ€™s resources by flooding it with excessive traffic?

A DDoS attack
B Spoofing attack
C Man in the middle attack
D Phishing attack

Which of the following methods is used to reduce latency and improve the speed of data transfer in a network?

A Data fragmentation
B Data compression
C Packet filtering
D Encryption

What is the role of Quality of Service (QoS) in network management?

A Encrypt data packets
B Assign IP addresses
C Compress data for transmission
D Manage network traffic

Which of the following network protocols is primarily used for securing communication between devices over the internet?

A TCP
B ARP
C IPsec
D DNS

What is the main purpose of Network Address Translation (NAT) in networking?

A Assign unique IP addresses
B Translate private IPs to public IPs
C Encrypt data for transmission
D Route packets across networks

Which of the following is a method used in load balancing to ensure optimal performance across servers?

A VLAN segmentation
B Traffic filtering
C Round robin DNS
D Packet sniffing

Which of the following techniques improves network security by limiting the potential damage from compromised systems?

A Network segmentation
B VPN usage
C Data encryption
D Load balancing

What is the purpose of a Virtual Private Network (VPN) in enhancing network security?

A Assigning IP addresses
B Monitoring network traffic
C Compressing data for faster transfer
D Creating a secure tunnel for data

Which of the following is a common strategy for improving network security and performance in a corporate environment?

A Using open source software
B Limiting bandwidth usage
C Implementing a VPN
D Using public IP addresses

What is the primary role of an Intrusion Detection System (IDS) in network security?

A Monitor and detect suspicious activities
B Prevent unauthorized access
C Encrypt sensitive data
D Assign IP addresses

Which of the following techniques is used to ensure that data is transmitted in the correct order and without errors in a network?

A Flow control
B Error correction
C Load balancing
D Packet switching

Which of the following is commonly used to measure the overall efficiency of a network in terms of data throughput?

A Throughput
B Bandwidth
C Latency
D Packet loss