MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
Configuration management can be divided into which two subsystems? |
| A. | reconfiguration and documentation |
| B. | management and configuration |
| C. | documentation and dialing up |
| D. | configuration and dialing up |
| Answer» B. management and configuration | |
| 252. |
A stateful firewall maintains a ___________ which is a list of active connections. |
| A. | routing table |
| B. | bridging table |
| C. | state table |
| D. | connection table |
| Answer» B. bridging table | |
| 253. |
A 4 byte IP address consists of __________ |
| A. | only network address |
| B. | only host address |
| C. | network address & host address |
| D. | network address & mac address |
| Answer» D. network address & mac address | |
| 254. |
Discarding policy is mainly done by _______ |
| A. | sender |
| B. | receiver |
| C. | router |
| D. | switch |
| Answer» D. switch | |
| 255. |
Which Layer is Responsible for Congestion Control? |
| A. | Network Layer |
| B. | Data link Layer |
| C. | Transport Layer |
| D. | Application layer |
| Answer» D. Application layer | |
| 256. |
Packet sniffers involve: |
| A. | Active receiver |
| B. | Passive receiver |
| C. | Both of the mentioned |
| D. | None of the mentioned |
| Answer» C. Both of the mentioned | |
| 257. |
High speed ethernet works on _________ |
| A. | coaxial cable |
| B. | twisted pair cable |
| C. | optical fiber |
| D. | unshielded twisted pair cable |
| Answer» D. unshielded twisted pair cable | |
| 258. |
The physical layer is responsible for __________ |
| A. | line coding |
| B. | channel coding |
| C. | modulation |
| D. | all of the mentioned |
| Answer» E. | |
| 259. |
The main contents of the routing table in datagram networks are ___________ |
| A. | source and destination address |
| B. | destination address and output port |
| C. | source address and output port |
| D. | input port and output port |
| Answer» C. source address and output port | |
| 260. |
ASK, PSK, FSK, and QAM are examples of encoding. |
| A. | digital-to-digital |
| B. | digital-to-analog |
| C. | analog-to-analog |
| D. | analog-to-digital |
| Answer» C. analog-to-analog | |
| 261. |
The physical layer provides __________ |
| A. | mechanical specifications of electrical connectors and cables |
| B. | electrical specification of transmission line signal level |
| C. | specification for ir over optical fiber |
| D. | all of the mentioned |
| Answer» E. | |
| 262. |
Which organization has authority over interstate and international commercein the communications field? |
| A. | ITU-T |
| B. | IEEE |
| C. | FCC |
| D. | ISOC |
| Answer» D. ISOC | |
| 263. |
In an Ethernet local area network, which one of the following statementsisTRUE? |
| A. | A station stops to sense the channel once it starts transmitting a frame. |
| B. | The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size. |
| C. | A station continues to transmit the packet even after the collision is detected. |
| D. | The exponential back off mechanism reduces the probability of collision on retransmissions |
| Answer» E. | |
| 264. |
UDP is an unreliable protocol. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 265. |
What does the java.net.InetAddress class represent? |
| A. | socket |
| B. | ip address |
| C. | protocol |
| D. | mac address |
| Answer» C. protocol | |
| 266. |
A _____ is a TCP name for a transport service access point. |
| A. | port |
| B. | pipe |
| C. | node |
| D. | protocol |
| Answer» B. pipe | |
| 267. |
Which of the following statements is not applicable for cable internet access? |
| A. | it is a shared broadcast medium |
| B. | it includes hfcs |
| C. | cable modem connects home pc to ethernet port |
| D. | analog signal is converted to digital signal in dslam |
| Answer» E. | |
| 268. |
A scatternet can have maximum __________ |
| A. | 10 piconets |
| B. | 20 piconets |
| C. | 30 piconets |
| D. | 40 piconets |
| Answer» B. 20 piconets | |
| 269. |
The combination of an IP address and a port number is known as ___________. |
| A. | network number |
| B. | socket address |
| C. | subnet mask number |
| D. | MAC address |
| Answer» C. subnet mask number | |
| 270. |
User datagram protocol is called connectionless because: |
| A. | all UDP packets are treated independently by transport layer |
| B. | it sends data as a stream of related packets |
| C. | both (a) and (b) |
| D. | none of the mentioned |
| Answer» B. it sends data as a stream of related packets | |
| 271. |
Ping can _________ |
| A. | measure round-trip time |
| B. | report packet loss |
| C. | report latency |
| D. | all of the mentioned |
| Answer» E. | |
| 272. |
What is the network ID for a computer whose IP address is190.148.64.23? |
| A. | 190 |
| B. | 190.148 |
| C. | 190.148.64 |
| D. | None of the above |
| Answer» C. 190.148.64 | |
| 273. |
_______ can detect burst error of length less than or equal to degree of thepolynomial and detects burst errors that affect odd number of bits. |
| A. | Hamming Code |
| B. | CRC |
| C. | VRC |
| D. | None of the above |
| Answer» C. VRC | |
| 274. |
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps? |
| A. | 1.6 seconds |
| B. | 2 seconds |
| C. | 5 seconds |
| D. | 8 seconds |
| Answer» C. 5 seconds | |
| 275. |
In a packet switching network, if the message size is 48 bytes and eachpacket contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is . |
| A. | 2 bytes |
| B. | 1 bytes |
| C. | 4 bytes |
| D. | 5 bytes |
| Answer» E. | |
| 276. |
The total nodal delay is given by ____________ |
| A. | dnodal = dproc – dqueue + dtrans + dprop |
| B. | dnodal = dproc + dtrans – dqueue |
| C. | dnodal = dproc + dqueue + dtrans + dprop |
| D. | dnodal = dproc + dqueue – dtrans – dprop |
| Answer» D. dnodal = dproc + dqueue – dtrans – dprop | |
| 277. |
FTP server listens for connection on which port number? |
| A. | 20 |
| B. | 21 |
| C. | 22 |
| D. | 23 |
| Answer» C. 22 | |
| 278. |
What is the full form of CAN? |
| A. | Campus Area Network |
| B. | Cluster Area Network |
| C. | Control Area network |
| D. | both A and B |
| Answer» E. | |
| 279. |
Frame relay has only _______ |
| A. | physical layer |
| B. | data link layer |
| C. | physical layer and data link layer |
| D. | network layer and data link layer |
| Answer» D. network layer and data link layer | |
| 280. |
Find the FTP reply whose message is wrongly matched: |
| A. | 331 – Username OK, password required |
| B. | 425 – Can’t open data connection |
| C. | 452 – Error writing file |
| D. | 452 – Can’t open data connection |
| Answer» E. | |
| 281. |
The File Transfer Protocol is built on ______________ |
| A. | data centric architecture |
| B. | service oriented architecture |
| C. | client server architecture |
| D. | connection oriented architecture |
| Answer» D. connection oriented architecture | |
| 282. |
Which of the following is not associated with the session layer? |
| A. | Dialog control |
| B. | Token management |
| C. | Semantics of the information transmitted |
| D. | Synchronization |
| Answer» D. Synchronization | |
| 283. |
The path layer of SONET is responsible for the movement of a signal _________ |
| A. | from its optical source to its optical destination |
| B. | across a physical line |
| C. | across a physical section |
| D. | back to its optical source |
| Answer» C. across a physical section | |
| 284. |
In wireless network an extended service set is a set of ________ |
| A. | connected basic service sets |
| B. | all stations |
| C. | all access points |
| D. | connected access points |
| Answer» B. all stations | |
| 285. |
What is the subnet id of a host with an IP address 172.16.66.0/21? |
| A. | 172.16.36.0 |
| B. | 172.16.48.0 |
| C. | 172.16.64.0 |
| D. | 172.16.0.0 |
| Answer» D. 172.16.0.0 | |
| 286. |
The process of keeping addresses in memory for future use is called |
| A. | Routing |
| B. | Resolving |
| C. | Caching |
| D. | None of the above |
| Answer» D. None of the above | |
| 287. |
Transmission delay does not depend on _____________ |
| A. | packet length |
| B. | distance between the routers |
| C. | transmission rate |
| D. | bandwidth of medium |
| Answer» C. transmission rate | |
| 288. |
The maximum size of payload field in ethernet frame is __________ |
| A. | 1000 bytes |
| B. | 1200 bytes |
| C. | 1300 bytes |
| D. | 1500 bytes |
| Answer» E. | |
| 289. |
Virtual circuit identifier in frame relay is called _______ |
| A. | data link connection identifier |
| B. | frame relay identifier |
| C. | cell relay identifier |
| D. | circuit connection identifier |
| Answer» B. frame relay identifier | |
| 290. |
The packet sent by a node to the source to inform it of congestion is called _______ |
| A. | explicit |
| B. | discard |
| C. | choke |
| D. | backpressure |
| Answer» D. backpressure | |
| 291. |
Communication offered by TCP is ________ |
| A. | full-duplex |
| B. | half-duplex |
| C. | semi-duplex |
| D. | byte by byte |
| Answer» B. half-duplex | |
| 292. |
In Ethernet CSMA/CD, the special bit sequence transmitted by media accessmanagement to handle collision is called |
| A. | Preamble |
| B. | Post amble |
| C. | Jam |
| D. | None of the above |
| Answer» D. None of the above | |
| 293. |
Which of the following is a MAC address? |
| A. | 192.166.200.50 |
| B. | 00056A:01A01A5CCA7FF60 |
| C. | 568, Airport Road |
| D. | 01:A5: BB: A7: FF: 60 |
| Answer» E. | |
| 294. |
In CRC there is no error if the remainder at the receiver is . |
| A. | equal to the remainder at the sender |
| B. | zero |
| C. | nonzero |
| D. | the quotient at the sender |
| Answer» C. nonzero | |
| 295. |
Storage management comprises of _______________ |
| A. | san management |
| B. | data protection |
| C. | disk operation |
| D. | all of the mentioned |
| Answer» E. | |
| 296. |
Which of the following layers is an addition to OSI model when compared with TCP IPmodel? |
| A. | Application layer |
| B. | Presentation layer |
| C. | Session layer |
| D. | Session and Presentation layer |
| Answer» E. | |
| 297. |
The network layer is concerned with __________ of data. |
| A. | bits |
| B. | frames |
| C. | packets |
| D. | bytes |
| Answer» D. bytes | |
| 298. |
Which of the following TCP/IP protocol is used for transferringelectronicmail messages from one machine to another? |
| A. | FTP |
| B. | SNMP |
| C. | SMTP |
| D. | RPC |
| Answer» D. RPC | |
| 299. |
WiMAX stands for ___________ |
| A. | wireless maximum communication |
| B. | worldwide interoperability for microwave access |
| C. | worldwide international standard for microwave access |
| D. | wireless internet maximum communication |
| Answer» C. worldwide international standard for microwave access | |
| 300. |
Ethernet in metropolitan area network (MAN) can be used as ___________ |
| A. | pure ethernet |
| B. | ethernet over sdh |
| C. | ethernet over mpls |
| D. | all of the mentioned |
| Answer» E. | |