MCQOPTIONS
Saved Bookmarks
This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
LSP stands for |
| A. | link stable packet |
| B. | link state packet |
| C. | link state protocol |
| D. | link state path |
| Answer» C. link state protocol | |
| 152. |
Next-Hop Method is used to reduce contents of a |
| A. | revolving table |
| B. | rotating table |
| C. | routing table |
| D. | re-allocate table |
| Answer» D. re-allocate table | |
| 153. |
In Unicast routing, if instability is between three nodes, stability cannot be |
| A. | stable |
| B. | reversed |
| C. | guaranteed |
| D. | forward |
| Answer» D. forward | |
| 154. |
A second technique to reduce routing table and simplify searching process is called |
| A. | network-specific method |
| B. | network-specific motion |
| C. | network-specific maintaining |
| D. | network-specific membership |
| Answer» B. network-specific motion | |
| 155. |
The term that is used to place packet in its route to its destination is called |
| A. | delayed |
| B. | urgent |
| C. | forwarding |
| D. | delivering |
| Answer» D. delivering | |
| 156. |
In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics. |
| A. | ticks & hops |
| B. | hops & loops |
| C. | loops & counts |
| D. | counts & ticks |
| Answer» B. hops & loops | |
| 157. |
Novell’s implementation of RIP updates routing tables every                    seconds. |
| A. | 60 |
| B. | 90 |
| C. | 10 |
| D. | 30 |
| Answer» B. 90 | |
| 158. |
To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? |
| A. | each router builds its own sap table and forwards that every 60 seconds |
| B. | each router assigns a service number and broadcasts that |
| C. | saps aren’t necessary with cisco routers |
| D. | cisco routers filter out all saps |
| Answer» B. each router assigns a service number and broadcasts that | |
| 159. |
By default, Cisco routers forward GNS SAPs to remote networks. |
| A. | false |
| B. | true |
| Answer» B. true | |
| 160. |
As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this? |
| A. | interface ethernet 0.1 ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx network 6c |
| B. | interface ethernet 0 ipx encapsulation novell-ether ipx network 9e interface ethernet 0 ipx encapsulation sap ipx network 6c |
| C. | interface ethernet 0.1 ipx encapsulation novell-ether interface ethernet 0.2 ipx encapsulation sap |
| D. | interface ethernet 0.1ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c |
| Answer» E. | |
| 161. |
You want to enable both arpa and snap encapsulation on one router interface. How do you do this? |
| A. | the interface can handle multiple encapsulation types with no extra configuration |
| B. | assign two network numbers, one for each encapsulation type |
| C. | enable novell-ether to run multiple encapsulation types |
| D. | both arpa and snap are enabled by default so you don’t have to configure anything |
| Answer» C. enable novell-ether to run multiple encapsulation types | |
| 162. |
As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction†command will flood the console. What is the command that you should use? |
| A. | debug ip igrp event |
| B. | debug ip igrp-events |
| C. | debug ip igrp summary |
| D. | debug ip igrp events |
| Answer» E. | |
| 163. |
Which NetWare protocol works on layer 3– network layer—of the OSI model? |
| A. | ipx |
| B. | ncp |
| C. | spx |
| D. | netbios |
| Answer» B. ncp | |
| 164. |
Which NetWare protocol provides link- state routing? |
| A. | nlsp |
| B. | rip |
| C. | sap |
| D. | ncp |
| Answer» B. rip | |
| 165. |
Consider a situation in which you are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem? |
| A. | netware 4.11 defaults to 802.2 encapsulation |
| B. | netware 4.11 defaults to 802.3 encapsulation |
| C. | cisco routers only work with netware 3.11 |
| D. | netware 3.11 defaults to 802.2 encapsulation |
| Answer» B. netware 4.11 defaults to 802.3 encapsulation | |
| 166. |
The network layer protocol for internet is |
| A. | ethernet |
| B. | internet protocol |
| C. | hypertext transfer protocol |
| D. | file transfer protocol |
| Answer» C. hypertext transfer protocol | |
| 167. |
Which one of the following algorithm is not used for congestion control? |
| A. | traffic aware routing |
| B. | admission control |
| C. | load shedding |
| D. | routing information protocol |
| Answer» E. | |
| 168. |
Which of the following field in IPv4 datagram is not related to fragmentation? |
| A. | flags |
| B. | offset |
| C. | tos |
| D. | identifier |
| Answer» D. identifier | |
| 169. |
The TTL field has value 10. How many routers (max) can process this datagram? |
| A. | 11 |
| B. | 5 |
| C. | 10 |
| D. | 1 |
| Answer» D. 1 | |
| 170. |
If the value in protocol field is 17, the transport layer protocol used is |
| A. | tcp |
| B. | udp |
| C. | icmp |
| D. | igmp |
| Answer» C. icmp | |
| 171. |
In                    systems, resources are allocated on demand. |
| A. | packet switching |
| B. | circuit switching |
| C. | line switching |
| D. | frequency switching |
| Answer» B. circuit switching | |
| 172. |
As the resources are reserved between two communicating end systems in circuit switching, Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â is achieved. |
| A. | authentication |
| B. | guaranteed constant rate |
| C. | reliability |
| D. | store and forward |
| Answer» C. reliability | |
| 173. |
The required resources for communication between end systems are reserved for the duration of the session between end systems in                  method. |
| A. | packet switching |
| B. | circuit switching |
| C. | line switching |
| D. | frequency switching |
| Answer» C. line switching | |
| 174. |
If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to |
| A. | n |
| B. | (n*l)/r |
| C. | (2n*l)/r |
| D. | l/r |
| Answer» C. (2n*l)/r | |
| 175. |
Most packet switches use this principle |
| A. | stop and wait |
| B. | store and forward |
| C. | store and wait |
| D. | stop and forward |
| Answer» C. store and wait | |
| 176. |
ICMP is primarily used for |
| A. | error and diagnostic functions |
| B. | addressing |
| C. | forwarding |
| D. | routing |
| Answer» B. addressing | |
| 177. |
A subset of a network that includes all the routers but contains no loops is called |
| A. | spanning tree |
| B. | spider structure |
| C. | spider tree |
| D. | special tree |
| Answer» B. spider structure | |
| 178. |
In virtual circuit network each packet contains |
| A. | full source and destination address |
| B. | a short vc number |
| C. | only source address |
| D. | only destination address |
| Answer» C. only source address | |
| 179. |
A 4 byte IP address consists of |
| A. | wired sensor network |
| B. | wireless sensor network |
| C. | wired service network |
| D. | wireless service network |
| Answer» C. wired service network | |
| 180. |
Number of methods in CoAP? |
| A. | 2 |
| B. | 5 |
| C. | 4 |
| D. | 3 |
| Answer» D. 3 | |
| 181. |
How many messages types are there in CoAP? |
| A. | 2 |
| B. | 5 |
| C. | 3 |
| D. | 4 |
| Answer» E. | |
| 182. |
CoAP messages are short. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 183. |
Which protocol interacts asynchronously over UDP? |
| A. | hmtp |
| B. | coap |
| C. | mqtt |
| D. | tcp/ip |
| Answer» C. mqtt | |
| 184. |
Adheres to                  approach for managing resources and support mapping to HTTP. |
| A. | retful |
| B. | iot |
| C. | restful |
| D. | restful |
| Answer» E. | |
| 185. |
                 resources are identified by Uniform Resource Identifiers. |
| A. | coap |
| B. | hmtp |
| C. | mqtt |
| D. | tcp/ip |
| Answer» B. hmtp | |
| 186. |
                 is an application layer protocol for resource constrained devices. |
| A. | coap |
| B. | hmtp |
| C. | mqtt |
| D. | tcp/ip |
| Answer» B. hmtp | |
| 187. |
                 supports low energy radio operation. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | bluetooth |
| Answer» E. | |
| 188. |
                 tags, devices, smart phones useful in identification. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» D. ieee 802.15.4.lowpan | |
| 189. |
                 enables open application layer for constrained nodes. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» C. rfid/nfc | |
| 190. |
                 specification defining the PHY and MAC layer of low power devices. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» E. | |
| 191. |
                 enables seamless integration of LoWPAN devices with internet leveraging. |
| A. | ietf 6lowpan |
| B. | ieft coap |
| C. | rfid/nfc |
| D. | ieee 802.15.4.lowpan |
| Answer» B. ieft coap | |
| 192. |
Which protocol is used to link all the devices in the IoT? |
| A. | tcp/ip |
| B. | network |
| C. | udp |
| D. | http |
| Answer» B. network | |
| 193. |
What is the access point (AP) in a wireless LAN? |
| A. | device that allows wireless devices to connect to a wired network |
| B. | wireless devices itself |
| C. | both device that allows wireless devices to connect to a wired network and wireless devices itself |
| D. | all the nodes in the network |
| Answer» B. wireless devices itself | |
| 194. |
Bluetooth supports |
| A. | point-to-point connections |
| B. | point-to-multipoint connection |
| C. | both point-to-point connections and point- to-multipoint connection |
| D. | multipoint to point connection |
| Answer» D. multipoint to point connection | |
| 195. |
A scatternet can have maximum |
| A. | 10 piconets |
| B. | 20 piconets |
| C. | 30 piconets |
| D. | 40 piconets |
| Answer» B. 20 piconets | |
| 196. |
Unauthorised access of information from a wireless device through a bluetooth connection is called |
| A. | bluemaking |
| B. | bluesnarfing |
| C. | bluestring |
| D. | bluescoping |
| Answer» C. bluestring | |
| 197. |
Bluetooth uses |
| A. | frequency hopping spread spectrum |
| B. | orthogonal frequency division multiplexing |
| C. | time division multiplexing |
| D. | channel division multiplexing |
| Answer» B. orthogonal frequency division multiplexing | |
| 198. |
An interconnected collection of piconet is called |
| A. | scatternet |
| B. | micronet |
| C. | mininet |
| D. | multinet |
| Answer» B. micronet | |
| 199. |
Bluetooth is the wireless technology for |
| A. | local area network |
| B. | personal area network |
| C. | metropolitan area network |
| D. | wide area network |
| Answer» C. metropolitan area network | |
| 200. |
Which tells about signalling? |
| A. | v series |
| B. | x series |
| C. | g series |
| D. | q series |
| Answer» E. | |