MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
ATM can be used for ________ |
| A. | local area network |
| B. | wide area network |
| C. | campus area network |
| D. | networks covering any range |
| Answer» E. | |
| 52. |
NAT stands for _____ . |
| A. | network address transformer |
| B. | network address translator |
| C. | network address translation |
| D. | Both B and C above |
| Answer» D. Both B and C above | |
| 53. |
If we want that a character be interpreted by the client instead of server _________ |
| A. | interpret as command (iac) escape character has to be used |
| B. | control functions has to be disabled |
| C. | it is not possible |
| D. | cli character has to be used |
| Answer» B. control functions has to be disabled | |
| 54. |
A is a TCP name for a transport service access point. |
| A. | port |
| B. | pipe |
| C. | node |
| D. | none of the mentioned |
| Answer» B. pipe | |
| 55. |
If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
| A. | 5 |
| B. | 10 |
| C. | 2 |
| D. | 6 |
| Answer» E. | |
| 56. |
ISP exchanges internet traffic between their networks by __________ |
| A. | internet exchange point |
| B. | subscriber end point |
| C. | isp end point |
| D. | internet end point |
| Answer» B. subscriber end point | |
| 57. |
What will be the efficiency of a Stop and Wait protocol, if the transmissiontime for a frame is 20ns and the propagation time is 30ns? |
| A. | 20% |
| B. | 25% |
| C. | 40% |
| D. | 66% |
| Answer» C. 40% | |
| 58. |
Which of the following are transport layer protocols used in networking? |
| A. | tcp and ftp |
| B. | udp and http |
| C. | tcp and udp |
| D. | http and ftp |
| Answer» D. http and ftp | |
| 59. |
EIGRP sends a hello message after every ___________ seconds. |
| A. | 5 seconds (lan), 60 seconds (wan) |
| B. | 5 seconds (lan), 5 seconds (wan) |
| C. | 15s |
| D. | 180s |
| Answer» B. 5 seconds (lan), 5 seconds (wan) | |
| 60. |
For default gateway, which of following commands will you use on a Cisco router? |
| A. | ip default network |
| B. | ip default gateway |
| C. | ip default route |
| D. | default network |
| Answer» B. ip default gateway | |
| 61. |
User datagram protocol is called connectionless because _____________ |
| A. | all udp packets are treated independently by transport layer |
| B. | it sends data as a stream of related packets |
| C. | it is received in the same order as sent order |
| D. | it sends data very quickly |
| Answer» B. it sends data as a stream of related packets | |
| 62. |
Why IP Protocol is considered as unreliable? |
| A. | A packet may be lost |
| B. | Packets may arrive out of order |
| C. | Duplicate packets may be generated |
| D. | All of the above |
| Answer» E. | |
| 63. |
Frame relay provides error detection at the ______ |
| A. | physical layer |
| B. | data link layer |
| C. | network layer |
| D. | transport layer |
| Answer» C. network layer | |
| 64. |
An RPC application requires _________ |
| A. | specific protocol for client server communication |
| B. | a client program |
| C. | a server program |
| D. | all of the mentioned |
| Answer» E. | |
| 65. |
HFC contains _______ |
| A. | fibre cable |
| B. | coaxial cable |
| C. | a combination of fibre cable and coaxial cable |
| D. | twisted pair cable |
| Answer» D. twisted pair cable | |
| 66. |
Retransmission of packets must not be done when _______ |
| A. | packet is lost |
| B. | packet is corrupted |
| C. | packet is needed |
| D. | packet is error-free |
| Answer» E. | |
| 67. |
The time required to examine the packet’s header and determine where to direct the packetis part of |
| A. | Processing delay |
| B. | Queuing delay |
| C. | Transmission delay |
| D. | Propagation delay |
| Answer» B. Queuing delay | |
| 68. |
If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is |
| A. | 32kbps |
| B. | 500bps |
| C. | 500kbps |
| D. | 32bps |
| Answer» B. 500bps | |
| 69. |
An IP address contains________ bits ? |
| A. | 8 |
| B. | 16 |
| C. | 32 |
| D. | 64 |
| Answer» D. 64 | |
| 70. |
For encryption, WiMAX supports _______ |
| A. | advanced encryption standard |
| B. | triple data encryption standard |
| C. | advanced encryption standard and triple data encryption standard |
| D. | double data encryption standard |
| Answer» D. double data encryption standard | |
| 71. |
The 802.5 standard implements a way for preventing collisions on thenetwork. How are collisions prevented when using this standard? |
| A. | CSMA/CD |
| B. | Token passing |
| C. | Collision detection |
| D. | Time sharing |
| Answer» C. Collision detection | |
| 72. |
Which of the following frequencies is not used in WiMAX for communication? |
| A. | 2.3 ghz |
| B. | 2.4 ghz |
| C. | 2.5 ghz |
| D. | 3.5 ghz |
| Answer» C. 2.5 ghz | |
| 73. |
Propagation delay depends on ___________ |
| A. | packet length |
| B. | transmission rate |
| C. | distance between the routers |
| D. | speed of the cpu |
| Answer» D. speed of the cpu | |
| 74. |
The combination of an IP address and port number is called as ________ |
| A. | socket address |
| B. | port address |
| C. | mac address |
| D. | host address |
| Answer» B. port address | |
| 75. |
Which one of the followings is a connectionless protocol? |
| A. | UDP |
| B. | Ethernet |
| C. | IPX |
| D. | All of the above |
| Answer» E. | |
| 76. |
A network management system can be divided into ___________ |
| A. | three categories |
| B. | five broad categories |
| C. | seven broad categories |
| D. | ten broad categories |
| Answer» C. seven broad categories | |
| 77. |
The number of layers in ISO OSI reference model is |
| A. | 5 |
| B. | 7 |
| C. | 6 |
| D. | 10 |
| Answer» C. 6 | |
| 78. |
DSL stands for ------------------------ |
| A. | data subscriber lines |
| B. | dual subscriber lines |
| C. | delay subscriber lines |
| D. | digital subscriber lines |
| Answer» E. | |
| 79. |
SMTP connections secured by SSL are known as _____________ |
| A. | smtps |
| B. | ssmtp |
| C. | snmp |
| D. | starttls |
| Answer» B. ssmtp | |
| 80. |
The main reason for transition from IPv4 to IPv6 is _________ |
| A. | huge number of systems on the internet |
| B. | very low number of system on the internet |
| C. | providing standard address |
| D. | to provide faster internet |
| Answer» B. very low number of system on the internet | |
| 81. |
A single channel is shared by multiple signals by ____________ |
| A. | analog modulation |
| B. | digital modulation |
| C. | multiplexing |
| D. | phase modulation |
| Answer» D. phase modulation | |
| 82. |
LSP stands for __________ |
| A. | link stable packet |
| B. | link state packet |
| C. | link state protocol |
| D. | link state path |
| Answer» C. link state protocol | |
| 83. |
Which multiplexing technique used to transmit digital signals? |
| A. | fdm |
| B. | tdm |
| C. | wdm |
| D. | fdm & wdm |
| Answer» C. wdm | |
| 84. |
Steps required in setup process are ___________ |
| A. | setup request and acknowledgement |
| B. | setup request and setup response |
| C. | setup request and setup termination |
| D. | setup and termination steps |
| Answer» B. setup request and setup response | |
| 85. |
Which of the following device is used to connect two systems, especiallyifthe systems use different protocols? |
| A. | hub |
| B. | bridge |
| C. | gateway |
| D. | repeater |
| Answer» D. repeater | |
| 86. |
RPF stands for __________ |
| A. | reverse path forwarding |
| B. | reverse path failure |
| C. | reverse packet forwarding |
| D. | reverse protocol failure |
| Answer» B. reverse path failure | |
| 87. |
In computer network nodes are _________ |
| A. | the computer that originates the data |
| B. | the computer that routes the data |
| C. | the computer that terminates the data |
| D. | all of the mentioned |
| Answer» E. | |
| 88. |
Ethernet frame consists of ____________ |
| A. | mac address |
| B. | ip address |
| C. | default mask |
| D. | network address |
| Answer» B. ip address | |
| 89. |
What is the max data transfer rate for optical fiber cable? |
| A. | 10 mbps |
| B. | 100 mbps |
| C. | 1000 mbps |
| D. | 10000 mbps |
| Answer» E. | |
| 90. |
The port number is “ephemeral port number”, if the source host is _______ |
| A. | ntp |
| B. | echo |
| C. | server |
| D. | client |
| Answer» E. | |
| 91. |
In serial data transmission, every byte of data is padded with a ‘0’ in thebeginning and one or two ‘1’ s at the end of byte because |
| A. | Receiver is to be synchronized for byte reception |
| B. | Receiver recovers lost ‘0’ and ‘1’s from these padded bits |
| C. | Padded bits are useful in parity computation |
| D. | None of these |
| Answer» B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits | |
| 92. |
Packets in datagram switching are referred to as ________ |
| A. | switches |
| B. | segments |
| C. | datagrams |
| D. | data-packets |
| Answer» D. data-packets | |
| 93. |
Which of the following factors affect transmission rate in DSL? |
| A. | the gauge of the twisted-pair line |
| B. | degree of electrical interfernece |
| C. | shadow fading |
| D. | the gauge of the twisted-pair line and degree of electrical interference |
| Answer» E. | |
| 94. |
A family of network control protocols (NCPs) ____________ |
| A. | are a series of independently defined protocols that provide a dynamic |
| B. | are a series of independently-defined protocols that encapsulate |
| C. | are a series of independently defined protocols that provide transparent |
| D. | the same as nfs |
| Answer» C. are a series of independently defined protocols that provide transparent | |
| 95. |
What are the uses of subnetting ? |
| A. | It divides one large network into several smaller ones |
| B. | It divides network into network classes |
| C. | It speeds up the speed of network |
| D. | None of above |
| Answer» B. It divides network into network classes | |
| 96. |
A network point that provides entrance into another network is called as ___________ |
| A. | Node |
| B. | Gateway |
| C. | Switch |
| D. | Router |
| Answer» C. Switch | |
| 97. |
What is the size of Host bits in Class B of IP address? |
| A. | 04 |
| B. | 08 |
| C. | 16 |
| D. | 32 |
| Answer» D. 32 | |
| 98. |
Which of the following protocol below are suited for email retrieval? |
| A. | POP3 |
| B. | IMAP |
| C. | FTP |
| D. | Both and b above |
| Answer» E. | |
| 99. |
Which routing protocol below is used by exterior routers between the autonomous systems? |
| A. | RIP |
| B. | IGRP |
| C. | OSPF |
| D. | BGP |
| Answer» E. | |
| 100. |
Transport layer of OSI model lies between Network and layer |
| A. | Application |
| B. | Data link |
| C. | Session |
| D. | Presentation |
| Answer» D. Presentation | |