MCQOPTIONS
Saved Bookmarks
This section includes 109 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
How many layers are used in Hybrid model? |
| A. | 7 |
| B. | 3 |
| C. | 5 |
| D. | 4 |
| Answer» D. 4 | |
| 52. |
When too many packets are present in a part of a subnet the performance degrades, this situation is called as Congestion. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 53. |
ICMP stands for ______________ . |
| A. | Internet Component Mail Protocol |
| B. | Internet Control Mail Protocol |
| C. | Information Component Mail Protocol |
| D. | Internet Control Message Protocol |
| Answer» E. | |
| 54. |
What is the purpose of using pseudo header in UDP? |
| A. | The data packets are delivered sequentially. |
| B. | Find out the destination port number and source port number. |
| C. | Sends the context of a particular internet destination address to UDP. |
| D. | Verifying the UDP packet has reached its correct destination. |
| Answer» E. | |
| 55. |
Ethernet is a multi-access network and most successful local area networking technology. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 56. |
What is the default port of SMTP? |
| A. | 85 |
| B. | 70 |
| C. | 80 |
| D. | 25 |
| Answer» E. | |
| 57. |
What is a path vector routing? |
| A. | network routing protocol |
| B. | inter-domain routing |
| C. | exterior gateway protocol |
| D. | None of the above |
| Answer» B. inter-domain routing | |
| 58. |
Consider the following types, I. Destination unreachable II. Source quench III. Query Messages IV. Time exceeded V . Redirection In the above, which is/are the error reporting types? |
| A. | I, II, III |
| B. | I, II, IV, V |
| C. | III, IV, V |
| D. | III, II, IV, V |
| Answer» C. III, IV, V | |
| 59. |
Which architectures is/are required to QoS? |
| A. | Integrated Services |
| B. | Differentiated Services |
| C. | Reserved Services |
| D. | Both a and b |
| E. | Both b and c |
| Answer» E. Both b and c | |
| 60. |
Abbreviate TDMA. |
| A. | Time Division Multiple Access |
| B. | Tree Diagonal Matrix Algorithm |
| C. | Transmission Devices Media Access |
| D. | Transport Devices Multiple Algorithm |
| Answer» B. Tree Diagonal Matrix Algorithm | |
| 61. |
What is the use of LAN bridges in the network? |
| A. | Provides real time and non real time services. |
| B. | Checks the MAC address of source and destination. |
| C. | Provides broadband ISDN for the data packets. |
| D. | None of the above |
| Answer» C. Provides broadband ISDN for the data packets. | |
| 62. |
Which of the following statements is/are correct about distance vector? |
| A. | Router don’t knows the identity of other router. |
| B. | Cost of each couple is not equal to destination. |
| C. | Each router maintains a distance vector. |
| D. | All of the above. |
| Answer» D. All of the above. | |
| 63. |
HDLC is developed by ________ . |
| A. | ISI |
| B. | ISO |
| C. | FPO |
| D. | ITC |
| Answer» C. FPO | |
| 64. |
When hierarchical routing is used on the internet? |
| A. | Total number of routers are divided into different regions. |
| B. | Routers cannot handle network traffic efficiently. |
| C. | Router increases the network size. |
| D. | None of the above |
| Answer» C. Router increases the network size. | |
| 65. |
Which protocol is used after authentication has been completed? |
| A. | User Datagram Protocol |
| B. | PPP Protocol |
| C. | Transmission Control Protocol |
| D. | Network Control Protocol |
| Answer» E. | |
| 66. |
What is the difference between MPLS and Virtual Circuit? |
| A. | The forwarding table is mostly used in MPLS but not in Virtual Circuit. |
| B. | The forwarding table is not constructed in Virtual Circuit but it is constructed in MPLS. |
| C. | In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection |
| D. | All of the above. |
| Answer» D. All of the above. | |
| 67. |
Which of the following is true about Network Control Protocol (NCP)? |
| A. | It is strictly used for data authentication. |
| B. | It decides the encapsulation of network layer data into the data link frame |
| C. | It is useful to set-up configure, maintain and terminate a link connection. |
| D. | All of the above. |
| Answer» C. It is useful to set-up configure, maintain and terminate a link connection. | |
| 68. |
Both HDLC and PPP both are Data link layer protocol. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 69. |
Which of the following statement is true about Connectionless service? |
| A. | The connection is established in connectionless service. |
| B. | Connectionless service is suitable for bursty transmission. |
| C. | Connectionless services can give services guarantees. |
| D. | Connectionless services can avoid bottleneck problem. |
| Answer» C. Connectionless services can give services guarantees. | |
| 70. |
What is Frame Check Sequence (FCS)? |
| A. | FCS is an error recovery process. |
| B. | FCS is an upper layer data. |
| C. | FCS is an error detecting code. |
| D. | FCS is a communication protocol. |
| Answer» D. FCS is a communication protocol. | |
| 71. |
What is/are the characteristics of Connection Oriented Service? |
| A. | The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible. |
| B. | Connection oriented service is suitable for short communication. |
| C. | Both a and b |
| D. | The connection is not established in the connection oriented service. |
| Answer» B. Connection oriented service is suitable for short communication. | |
| 72. |
Why Ipv6 replaces ARP by using the ND protocol? |
| A. | The ARP address statically bound. |
| B. | The security issues are apply. |
| C. | Both a and b |
| D. | The interface identifier portion of an Ipv6 address is directly derived from MAC address. |
| Answer» E. | |
| 73. |
Both HDLC and PPP are data link layer protocols. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 74. |
Which of the following are the HTTP methods (request types)? I. GET II. POST III. PATCH IV. BODY V. CREATE VI. OPTION |
| A. | I, II, III, IV, V |
| B. | I, II |
| C. | IV, V, VI |
| D. | I, II, III, VI |
| Answer» E. | |
| 75. |
Which of the following is/are the disadvantages of fragmentation? |
| A. | All the packets should exit via the same gateway |
| B. | Overhead doesn't required to repeatedly fragment. |
| C. | Dos attack will encounter. |
| D. | All of the above |
| Answer» B. Overhead doesn't required to repeatedly fragment. | |
| 76. |
What is the difference between Delay and Jitter? |
| A. | Delay takes less time for buffering while jitter takes more time for buffering. |
| B. | Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay |
| C. | Time delay is a variable in delay but not in jitter. |
| D. | All of the above |
| Answer» C. Time delay is a variable in delay but not in jitter. | |
| 77. |
Which cell does Asynchronous Transfer Mode (ATM) use? |
| A. | Bridges |
| B. | Switches |
| C. | Routers |
| D. | Hubs |
| Answer» C. Routers | |
| 78. |
Which of the following is the communication protocol developed by ISO? |
| A. | MPLS |
| B. | PPP |
| C. | HDLC |
| D. | CRC |
| Answer» D. CRC | |
| 79. |
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network? |
| A. | LCP |
| B. | NCP |
| C. | Both a and b |
| D. | TCP |
| Answer» D. TCP | |
| 80. |
Which of the following statements is/are true about MPLS packets? |
| A. | It creates a virtual circuit for transmission of data packets. |
| B. | The label is used as an index for determining which outgoing line and new label is to be used. This new label contains the address of next MPLS router |
| C. | MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow. |
| D. | Both b and c |
| E. | Both a and c |
| Answer» C. MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow. | |
| 81. |
What is the use of TPDU in socket programming? |
| A. | It creates new socket in the transport entity when it requests for a connection. |
| B. | It allocates the table space within the transport entity. |
| C. | It is used for establishing the connection. |
| D. | None of the above. |
| Answer» B. It allocates the table space within the transport entity. | |
| 82. |
Which of the following is true about “Threshold”? |
| A. | Threshold is a value. |
| B. | Threshold has value levels, such as minimum level, maximum level, equal level. |
| C. | If the data value doesn't suit the threshold value, then it indicates that this data value might lead to poor performance of the network. |
| D. | All of the above |
| Answer» E. | |
| 83. |
Abbreviate the term TPDU in socket programming. |
| A. | Transport Protocol Distribution Unit |
| B. | Transcranial Pulsed Doppler Ultrasound |
| C. | Transport Protocol Data Unit |
| D. | Terminal Power Distribution Unit |
| Answer» D. Terminal Power Distribution Unit | |
| 84. |
The communication structure that we need in socket programming is called as _________. |
| A. | System calls |
| B. | Socket |
| C. | Procedure |
| D. | Table space |
| Answer» C. Procedure | |
| 85. |
What is Quality of Service? |
| A. | It is the capability of a network to provide better service to selected network traffic over various technologies. |
| B. | It is a priority network that provides dedicated bandwidth, controlled jitter and latency. |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 86. |
Which of the following is true about Manchester encoding? |
| A. | Each bit period is divided into two equal intervals. |
| B. | It requires more bandwidth than 8B/10B encoding. |
| C. | It is a form of digital encoding. |
| D. | All of the above |
| Answer» E. | |
| 87. |
Why was the IETF developed? |
| A. | to support quality of service |
| B. | to create standardized protocols |
| C. | for IP security |
| D. | All of the above |
| Answer» C. for IP security | |
| 88. |
Cluster is a group of ___________ . |
| A. | regions |
| B. | zones |
| C. | resources. |
| D. | parameters |
| Answer» B. zones | |
| 89. |
Which of the following is/are the Routing algorithms? |
| A. | Nonadaptive algorithm and Adaptive algorithm |
| B. | Static routing and Dynamic routing |
| C. | Distance vector routing and link state routing |
| D. | Both a and b |
| E. | All of the above |
| Answer» E. All of the above | |
| 90. |
OSPF stands for _______ . |
| A. | Object Service Priority First |
| B. | Open Shortest Path First |
| C. | Open Space Preservation Fund |
| D. | Ocular Sun Protective Factor |
| Answer» C. Open Space Preservation Fund | |
| 91. |
Abbreviate MPLS. |
| A. | Multi Protocol Label Switching |
| B. | Multiple Lable Storage |
| C. | Multiplicative Label Switching |
| D. | Multi Process Label Switching |
| Answer» B. Multiple Lable Storage | |
| 92. |
Which of the following statements is/are true about OSPF? |
| A. | error detecting process. |
| B. | interior routing protocol. |
| C. | widely used in TCP/IP. |
| D. | create traffic load on multiple links. |
| Answer» C. widely used in TCP/IP. | |
| 93. |
Which of the following types is/are the network connecting devices? |
| A. | Repeaters and Hubs |
| B. | Bridges and Routers |
| C. | Gateway and switches |
| D. | All of the above |
| Answer» E. | |
| 94. |
Consider the following features, I. Load Balancing II. Security III. Easy to configure IV. Supports authentication What is/are the features of OSPF? |
| A. | II, IV |
| B. | II, III |
| C. | I, II, IV |
| D. | I, II, III |
| Answer» D. I, II, III | |
| 95. |
Which of the following aspects is/are mostly covered in the FEC? |
| A. | How many packets are there. |
| B. | What type of service class is there |
| C. | Which packets are going to be used. |
| D. | Where the packets are going. |
| Answer» E. | |
| 96. |
What is/are the advantages of Token ring? |
| A. | It doesn't provide a priority system that allow administrators to use the network more frequently. |
| B. | Multiple identical MAC addresses are supported on Token ring. |
| C. | All of the above |
| D. | None of the above. |
| Answer» C. All of the above | |
| 97. |
Differential Manchester encoding is also known as ___________ . |
| A. | Clock Signals |
| B. | Condition Diphase encoding |
| C. | Bipolar encoding |
| D. | Biphase mark code |
| Answer» C. Bipolar encoding | |
| 98. |
What is the difference between Token Ring and Ethernet? |
| A. | Ethernet network interface cards cannot operate on a passive hub but Token ring can operate on a passive hub. |
| B. | Ethernet does have an access for priority system but Token ring doesn't have any access for priority system on the token. |
| C. | Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software |
| D. | Ethernet can support MAC address. Token ring cannot support MAC address. |
| Answer» D. Ethernet can support MAC address. Token ring cannot support MAC address. | |
| 99. |
Which of the following protocol is used to allow the encapsulation of data coming from the network layer protocol? |
| A. | TCP |
| B. | NCP |
| C. | LCP |
| D. | HDLC |
| Answer» C. LCP | |
| 100. |
What does the Link Control Protocol (LCP) do in PPP? |
| A. | Set-up configure |
| B. | Maintaining a link |
| C. | Terminating a link |
| D. | Both b and c |
| E. | All of the above |
| Answer» F. | |