& Security Exam With Correct Answers 2025/2026.
1. What is the "OSI Model" and why is it used in networking?
correct answer The Open Systems Interconnection (OSI) model is a conceptual framework
that characterizes and standardizes the communication functions of a telecommunication or
computing system. It consists of seven layers: Physical, Data Link, Network, Transport,
Session, Presentation, and Application. It is used to troubleshoot network issues by isolating
problems to a specific layer and to ensure interoperability between different vendors'
products.
2. Explain the purpose of a "Default Gateway."
correct answer A default gateway is the node (typically a router) on a computer network that
serves as an access point to another network when no other route matches the destination
IP address of a packet. Without a default gateway, a device can communicate with other
devices on its local subnet but cannot access the Internet or remote networks.
3. What is "DHCP" (Dynamic Host Configuration Protocol)?
correct answer DHCP is a network management protocol used on IP networks where a DHCP
server dynamically assigns an IP address and other network configuration parameters (like
subnet masks and DNS addresses) to each device on a network. This eliminates the need
for manual IP configuration, preventing IP conflicts and simplifying network administration.
4. Define "Subnetting" and its primary benefit.
correct answer Subnetting is the practice of dividing a single physical network into two or
more smaller logical sub-networks (subnets). The primary benefit is improved network
performance and security; it reduces broadcast traffic and allows administrators to apply
different security policies to different groups of users.
5. What is a "MAC Address" and how does it differ from an IP address?
correct answer A Media Access Control (MAC) address is a unique identifier assigned to a
Network Interface Controller (NIC) for use as a network address in communications within a
network segment (Layer 2). Unlike an IP address, which is logical and can change depending
on the network, a MAC address is hard-coded into the hardware and generally remains
permanent.
6. Explain "VLAN" (Virtual Local Area Network).
correct answer A VLAN is a logical group of workstations, servers, and network devices that
appear to be on the same LAN despite their geographical distribution. VLANs allow a
network administrator to segment a network without needing to run new cables, improving
security by isolating sensitive data traffic from the rest of the network.
7. What is the "TCP/IP" suite?
correct answer TCP/IP is the set of communications protocols used to connect hosts on the
Internet. It is named after its two most important protocols: Transmission Control Protocol
(TCP) and Internet Protocol (IP). While the OSI model has seven layers, the TCP/IP
model typically consists of four: Network Access, Internet, Transport, and Application.
, 8. Describe the function of "DNS" (Domain Name System).
correct answer DNS acts as the "phonebook" of the Internet, translating human-friendly
domain names (like microsoft.com) into machine-friendly IP addresses (like 104.215.148.63).
When you enter a URL, your computer queries a DNS resolver to find the correct server to
connect to.
9. What is "Port Forwarding"?
correct answer Port forwarding is a technique used to allow external devices to access
computer services on private networks. It redirects a communication request from one
address and port number combination to another while the packets are traversing a network
gateway, such as a router. This is commonly used for hosting web servers or gaming.
10. Explain the difference between "Switch" and "Hub."
correct answer A hub is a simple device that broadcasts all incoming data packets to every
port, leading to high network congestion and security risks. A switch is an "intelligent" device
that learns the MAC addresses of connected devices and forwards data only to the specific
port intended for the recipient, greatly improving efficiency.
11. What is "Ping" and what protocol does it use?
correct answer Ping is a computer network administration software utility used to test the
reachability of a host on an IP network and to measure the round-trip time for messages. It
uses the Internet Control Message Protocol (ICMP) to send "echo requests" and wait for
"echo replies."
12. Define "Traceroute" (or Tracert).
correct answer Traceroute is a diagnostic tool for displaying the route (path) and measuring
transit delays of packets across an IP network. it lists all the routers (hops) a packet passes
through to reach its destination, helping administrators identify where a connection is failing.
13. What is a "VPN" and what is "Tunneling"?
correct answer A Virtual Private Network (VPN) provides a secure connection over a public
network. Tunneling is the process of encapsulating a private data packet inside a public
protocol (like IP) to transport it securely. This creates an encrypted "tunnel" that keeps data
private from ISPs or hackers.
14. Describe "Denial of Service" (DoS) and "DDoS."
correct answer A DoS attack attempts to make a machine or network resource unavailable to
its intended users by flooding it with traffic. A Distributed Denial of Service (DDoS) attack is a
DoS where the attack traffic comes from multiple synchronized sources (often a botnet),
making it much harder to block.
15. What is "Social Engineering" in a security context?
correct answer Social engineering is the psychological manipulation of people into
performing actions or divulging confidential information. It relies on human error rather than
technical vulnerabilities. Examples include phishing, baiting, and pretexting.
16. Explain "Firewall" rules and "Access Control Lists" (ACLs).
correct answer A firewall uses a set of rules to determine whether to allow or block network
traffic. An ACL is a list of permissions attached to an object (like a router port) that specifies
which users or system processes are granted access. ACLs are the primary method for
filtering traffic based on IP address or port number.