MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
In the OSI model, as a data packet moves from the lower to the upper layers, headers are . |
| A. | added |
| B. | removed |
| C. | rearranged |
| D. | Modified |
| Answer» C. rearranged | |
| 102. |
Which of the following modulation schemes is supported by WiMAX? |
| A. | binary phase shift keying modulation |
| B. | quadrature phase shift keying modulation |
| C. | quadrature amplitude modulation |
| D. | all of the mentioned |
| Answer» E. | |
| 103. |
How many layers are present in the Internet protocol stack (TCP/IP model)? |
| A. | 5 |
| B. | 7 |
| C. | 6 |
| D. | 10 |
| Answer» B. 7 | |
| 104. |
Where should we use default routing? |
| A. | on stub networks- which have only one exit path out of the network |
| B. | which have more than one exit path out of the network |
| C. | minimum five exit paths out of the network |
| D. | maximum five exit paths out of the network |
| Answer» B. which have more than one exit path out of the network | |
| 105. |
A subset of a network that includes all the routers but contains no loops iscalled: |
| A. | spanning tree |
| B. | spider structure |
| C. | spider tree |
| D. | none of the mentioned |
| Answer» B. spider structure | |
| 106. |
Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Serversystem using message queues. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 107. |
DSL telcos provide which of the following services? |
| A. | wired phone access |
| B. | isp |
| C. | wired phone access and isp |
| D. | network routing and isp |
| Answer» D. network routing and isp | |
| 108. |
Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peerdevices. |
| A. | five |
| B. | eight |
| C. | nine |
| D. | four |
| Answer» C. nine | |
| 109. |
In classful addressing, a large part of available addresses are ________ |
| A. | organized |
| B. | blocked |
| C. | wasted |
| D. | communicated |
| Answer» D. communicated | |
| 110. |
The main difference between SNMPv3 and SNMPv2 is _______ |
| A. | management |
| B. | integration |
| C. | classification |
| D. | enhanced security |
| Answer» E. | |
| 111. |
WiMAX provides ________ |
| A. | simplex communication |
| B. | half duplex communication |
| C. | full duplex communication |
| D. | no communication |
| Answer» D. no communication | |
| 112. |
ATM uses _______________ |
| A. | asynchronous frequency division multiplexing |
| B. | asynchronous time division multiplexing |
| C. | asynchronous space division multiplexing |
| D. | asynchronous amplitude division multiplexing |
| Answer» C. asynchronous space division multiplexing | |
| 113. |
The domain name system is maintained by _______ |
| A. | distributed database system |
| B. | a single server |
| C. | a single computer |
| D. | none of the mentioned |
| Answer» B. a single server | |
| 114. |
Which of the following is an advantage of anomaly detection? |
| A. | rules are easy to define |
| B. | custom protocols can be easily analyzed |
| C. | the engine can scale as the rule set grows |
| D. | malicious activity that falls within normal usage patterns is detected |
| Answer» D. malicious activity that falls within normal usage patterns is detected | |
| 115. |
WAN stands for __________ |
| A. | world area network |
| B. | wide area network |
| C. | web area network |
| D. | web access network |
| Answer» C. web area network | |
| 116. |
Telnet protocol is used to establish a connection to __________ |
| A. | tcp port number 21 |
| B. | tcp port number 22 |
| C. | tcp port number 23 |
| D. | tcp port number 25 |
| Answer» D. tcp port number 25 | |
| 117. |
A network router joins two _________ together? |
| A. | Computers |
| B. | Switches |
| C. | Networks |
| D. | Gateway |
| Answer» D. Gateway | |
| 118. |
An RPC (remote procedure call) is initiated by the _________ |
| A. | server |
| B. | client |
| C. | client after the sever |
| D. | a third party |
| Answer» C. client after the sever | |
| 119. |
A list of protocols used by a system, one protocol per layer, is called ________ |
| A. | protocol architecture |
| B. | protocol stack |
| C. | protocol suite |
| D. | protocol system |
| Answer» C. protocol suite | |
| 120. |
To use a Simple Network Management System, we need _______ |
| A. | servers |
| B. | ip |
| C. | protocols |
| D. | rules |
| Answer» E. | |
| 121. |
ICMP is primarily used for __________ |
| A. | error and diagnostic functions |
| B. | addressing |
| C. | forwarding |
| D. | routing |
| Answer» B. addressing | |
| 122. |
ICMP is primarily used for: |
| A. | error and diagnostic functions |
| B. | addressing |
| C. | forwarding |
| D. | none of the mentioned |
| Answer» B. addressing | |
| 123. |
Which Project 802 standard provides for a collision-free protocol? |
| A. | 802.2 |
| B. | 802.3 |
| C. | 802.5 |
| D. | 802.6 |
| Answer» D. 802.6 | |
| 124. |
ALL IP addresses are divided into a network address and host address |
| A. | True |
| B. | False |
| Answer» B. False | |
| 125. |
Firewalls are often configured to block ___________ |
| A. | udp traffic |
| B. | tcp traffic |
| C. | sensitive traffic |
| D. | best-effort traffic |
| Answer» B. tcp traffic | |
| 126. |
ESP does not provide ________ |
| A. | source authentication |
| B. | data integrity |
| C. | privacy |
| D. | error control |
| Answer» E. | |
| 127. |
The function of DSLAM is to __________ |
| A. | convert analog signals into digital signals |
| B. | convert digital signals into analog signals |
| C. | amplify digital signals |
| D. | de-amplify digital signals |
| Answer» B. convert digital signals into analog signals | |
| 128. |
What allows TCP to detect lost segments and in turn recover from that loss? |
| A. | sequence number |
| B. | acknowledgment number |
| C. | checksum |
| D. | both sequence & acknowledgment number |
| Answer» C. checksum | |
| 129. |
Which of the following below is a loopback IP address? |
| A. | 127.0.0.0 |
| B. | 127.0.1.1 |
| C. | 127.0.1.0 |
| D. | 127.0.0.1 |
| Answer» E. | |
| 130. |
Range of port numbers in Internet model is __________ |
| A. | 0 and 32,765(8-bit) |
| B. | 0 and 32,765(16-bit) |
| C. | 0 and 65,535(32-bit) |
| D. | 0 and 65,535(16-bit) |
| Answer» E. | |
| 131. |
Application layer is implemented in ____________ |
| A. | end system |
| B. | nic |
| C. | ethernet |
| D. | packet transport |
| Answer» B. nic | |
| 132. |
A session may include ________ |
| A. | zero or more smtp transactions |
| B. | exactly one smtp transactions |
| C. | always more than one smtp transactions |
| D. | number of smtp transactions cant be determined |
| Answer» B. exactly one smtp transactions | |
| 133. |
is the multiplexing technique that shifts each signal to a different carrierfrequency. |
| A. | FDM |
| B. | TDM |
| C. | Both FDM & TDM |
| D. | PDM |
| Answer» B. TDM | |
| 134. |
Which of the following below are secure VPN protocols? |
| A. | UDP |
| B. | TCP |
| C. | SSTP |
| D. | Both B and C |
| Answer» E. | |
| 135. |
SYNC flooding attack belongs to a type of security attack known as ___________ |
| A. | sync flooding attack |
| B. | active attack |
| C. | passive attack |
| D. | denial-of-service attack |
| Answer» E. | |
| 136. |
Return value of the UDP port “Chargen” is _______ |
| A. | string of characters |
| B. | string of integers |
| C. | array of characters with integers |
| D. | array of zero’s and one’s |
| Answer» B. string of integers | |
| 137. |
Which IP address is reserved for software loop-back? |
| A. | 224.x.x.x |
| B. | 127.x.x.x |
| C. | 0.0.0.0 |
| D. | 255.255.255.255 |
| Answer» C. 0.0.0.0 | |
| 138. |
The functionalities of the presentation layerinclude |
| A. | Data compression |
| B. | Data encryption |
| C. | Data description |
| D. | All of the mentioned |
| Answer» E. | |
| 139. |
An endpoint of an inter-process communication flow across a computer network is called: |
| A. | socket |
| B. | pipe |
| C. | port |
| D. | none of the mentioned |
| Answer» B. pipe | |
| 140. |
Which of these is a feature of hubs? |
| A. | Hubs amplifies the incoming signal. |
| B. | Hubs understand frames, packets or headers |
| C. | All lines coming into a Hub must operate at a same speed. |
| D. | all of these |
| Answer» D. all of these | |
| 141. |
What are the other types of OLAP apart from ROLAP? |
| A. | HOLAP |
| B. | MOLAP |
| C. | DOLAP |
| D. | Both a and b above |
| Answer» C. DOLAP | |
| 142. |
Ping command works on which protocol? |
| A. | ICMP |
| B. | TCP |
| C. | IP |
| D. | UDP |
| Answer» B. TCP | |
| 143. |
MAC addresses are also known as? |
| A. | Hardware address |
| B. | Physical address |
| C. | both and b above |
| D. | IP address |
| Answer» D. IP address | |
| 144. |
Dual-stack approach refers to _________ |
| A. | implementing ipv4 with 2 stacks |
| B. | implementing ipv6 with 2 stacks |
| C. | node has both ipv4 and ipv6 support |
| D. | implementing a mac address with 2 stacks |
| Answer» D. implementing a mac address with 2 stacks | |
| 145. |
Which of the following statements can be associated with OSI model? |
| A. | a structured way to discuss and easier update system components |
| B. | one layer may duplicate lower layer functionality |
| C. | functionality at one layer no way requires information from another layer |
| D. | it is an application specific network model |
| Answer» D. it is an application specific network model | |
| 146. |
Delimiting and synchronization of data exchange is providedby |
| A. | Application layer |
| B. | Session layer |
| C. | Transport layer |
| D. | Link layer |
| Answer» C. Transport layer | |
| 147. |
Communication channel is shared by all the machines on the networkin |
| A. | Broadcast network |
| B. | Unicast network |
| C. | Multicast network |
| D. | Anycast network |
| Answer» B. Unicast network | |
| 148. |
Delimiting and synchronization of data exchange is provided by __________ |
| A. | application layer |
| B. | session layer |
| C. | transport layer |
| D. | link layer |
| Answer» C. transport layer | |
| 149. |
MIB is a collection of groups of objects that can be managed by __________ |
| A. | smtp |
| B. | udp |
| C. | snmp |
| D. | tcp/ip |
| Answer» D. tcp/ip | |
| 150. |
Which connector does the STP cable use? |
| A. | bnc |
| B. | rj-11 |
| C. | rj-45 |
| D. | rj-69 |
| Answer» D. rj-69 | |