MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In IPv4 layer, datagrams are the |
| A. | Frames |
| B. | Addresses |
| C. | Protocol |
| D. | Packets |
| Answer» E. | |
| 2. |
Internet Control Message Protocol (ICMP) is companion of |
| A. | IP Transmission |
| B. | IP Packet |
| C. | IP Frame |
| D. | IP protocol |
| Answer» E. | |
| 3. |
A switch in a datagram network uses a |
| A. | destination address |
| B. | sender address |
| C. | routing table |
| D. | header |
| Answer» D. header | |
| 4. |
If an Address Resolution Protocol (ARP) request is broadcast, an ARP reply is |
| A. | Universal |
| B. | Unicast |
| C. | Multicast |
| D. | Generated locally |
| Answer» C. Multicast | |
| 5. |
IP is a connectionless |
| A. | Source |
| B. | Protocol |
| C. | Station |
| D. | Destination |
| Answer» C. Station | |
| 6. |
In Address Resolution Protocol (ARP), a packet is encapsulated directly into a |
| A. | Data link Integer |
| B. | Network Frame |
| C. | Network Station |
| D. | Data link Frame |
| Answer» E. | |
| 7. |
In IPv4, value of Maximum Transfer Unit (MTU) depends on the |
| A. | Physical network protocol |
| B. | DataLink network protocol |
| C. | UD protocol |
| D. | Tr |
| Answer» D. Tr | |
| 8. |
Asynchronous Transfer Mode (ATM) network is an example of |
| A. | Packet switching network |
| B. | Datagram Networks |
| C. | Virtual circuit network |
| D. | message switched network |
| Answer» D. message switched network | |
| 9. |
Switching in Internet is done by using datagram approach to packet switching at the |
| A. | network layer |
| B. | application layer |
| C. | data link layer |
| D. | physical layer. |
| Answer» B. application layer | |
| 10. |
Address Resolution Protocol (ARP) is a |
| A. | 8 Bit Field |
| B. | 10 Bit Field |
| C. | 12 Bit Field |
| D. | 16 Bit Field |
| Answer» E. | |
| 11. |
Application layer provides basis for |
| A. | Email services |
| B. | Frame Division |
| C. | File Making |
| D. | None of the above |
| Answer» B. Frame Division | |
| 12. |
In Address Resolution Protocol (ARP), each LAN has been assigned a |
| A. | Trigger |
| B. | Integer |
| C. | Repeater |
| D. | Process header |
| Answer» C. Repeater | |
| 13. |
Parameter that is normally achieved through a trailer added to end of frame is |
| A. | Access Control |
| B. | Flow Control |
| C. | Error Control |
| D. | Physical addressing. |
| Answer» D. Physical addressing. | |
| 14. |
The data link layer takes the packets from _________ and encapsulates them into frames fortransmission. |
| A. | network layer |
| B. | physical layer |
| C. | transport layer |
| D. | application layer |
| Answer» B. physical layer | |
| 15. |
Internet Control Message Protocol (ICMP) has header size of |
| A. | 12 Bytes |
| B. | 10 Bytes |
| C. | 08 Bytes |
| D. | 06 Bytes |
| Answer» D. 06 Bytes | |
| 16. |
Choose “.NET class” name from which data type “UInt” is derived ? |
| A. | System.Int16 |
| B. | System.UInt32 |
| C. | System.UInt64 |
| D. | System.UInt16 |
| Answer» C. System.UInt64 | |
| 17. |
Which of the following architecture uses CSMA/CD access method? |
| A. | ARC net |
| B. | Ethernet |
| C. | Router |
| D. | STP server |
| Answer» C. Router | |
| 18. |
What is max data capacity for optical fiber cable? |
| A. | 10 mbps |
| B. | 100 mbps |
| C. | 1000 mbps |
| D. | 10000 mbps |
| Answer» D. 10000 mbps | |
| 19. |
What is the central device in star topology? |
| A. | STP server |
| B. | Hub/switch |
| C. | PDC |
| D. | Router |
| Answer» C. PDC | |
| 20. |
Which connector STP uses? |
| A. | BNC |
| B. | RJ-11 |
| C. | RJ-45 |
| D. | RJ-69 |
| Answer» D. RJ-69 | |
| 21. |
What is the max data capacity of STP? |
| A. | 10 mbps |
| B. | 100 mbps |
| C. | 1000 mbps |
| D. | 10000 mbps |
| Answer» C. 1000 mbps | |
| 22. |
What is the max cable length of STP? |
| A. | 100 ft |
| B. | 200 ft |
| C. | 100 m |
| D. | 200 m |
| Answer» E. | |
| 23. |
The __________ portion of LAN management software restricts access, records user activities and audit data etc. |
| A. | Configuration management |
| B. | Security management |
| C. | Performance management |
| D. | None of the mentioned |
| Answer» C. Performance management | |
| 24. |
A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________ |
| A. | LAN intrinsic software |
| B. | LAN aware software |
| C. | Groupware |
| D. | LAN ignorant software |
| Answer» B. LAN aware software | |
| 25. |
STP stands for |
| A. | Shielded twisted pair cable |
| B. | Spanning tree protocol |
| C. | Static transport protocol |
| D. | None of the mentioned |
| Answer» B. Spanning tree protocol | |
| 26. |
_____________ allows LAN users to share computer programs and data. |
| A. | Communication server |
| B. | Print server |
| C. | File server |
| D. | Network |
| Answer» D. Network | |
| 27. |
In EIGRP best path is known as the successor, where as backup path is known as __________ |
| A. | Feasible successor |
| B. | Back-up route |
| C. | Default route |
| D. | There is no backup route in EIGRP |
| Answer» B. Back-up route | |
| 28. |
EIGRP uses the ____________ algorithm for finding shortest path. |
| A. | SPF |
| B. | DUAL |
| C. | Linkstat |
| D. | Dikstraalgo |
| Answer» C. Linkstat | |
| 29. |
Administrative distance for external EIGRP route is _______ |
| A. | 90 |
| B. | 170 |
| C. | 110 |
| D. | 100 |
| Answer» C. 110 | |
| 30. |
For default gateway you will use which of following command on Cisco router? |
| A. | IP default network |
| B. | IP default gateway |
| C. | IP default route |
| D. | Default network |
| Answer» B. IP default gateway | |
| 31. |
The EIGRP metric values include: |
| A. | Delay |
| B. | Bandwidth |
| C. | MTU |
| D. | All of the above |
| Answer» E. | |
| 32. |
Administrative distance for internal EIGRP is ______ |
| A. | 90 |
| B. | 170 |
| C. | 110 |
| D. | 91 |
| Answer» B. 170 | |
| 33. |
EIGRP send the hello message after every ___________ seconds |
| A. | 5 seconds (LAN), 60 seconds (WAN) |
| B. | 5 seconds (LAN), 5 seconds (WAN) |
| C. | 15s |
| D. | 180s |
| Answer» B. 5 seconds (LAN), 5 seconds (WAN) | |
| 34. |
EIGRP can support ____________ |
| A. | VLSM/subnetting |
| B. | Auto summary |
| C. | Unequal cast load balancing |
| D. | All od the above |
| Answer» E. | |
| 35. |
EIGRP metric is ________ |
| A. | K-values |
| B. | Bandwidth only |
| C. | Hop Count |
| D. | Delay only |
| Answer» B. Bandwidth only | |
| 36. |
The link necessarily begins and ends with this phase. During this phase, the LCP automata will be in INITIAL or STARTING states |
| A. | Link-termination phase |
| B. | Link establishment phase |
| C. | Authentication phase |
| D. | Link dead phase |
| Answer» E. | |
| 37. |
Choose one from the following |
| A. | PPP can terminate the link at any time |
| B. | PPP can terminate the link only during the link establishment phase |
| C. | PPP can terminate the link during the authentication phase |
| D. | None of the mentioned |
| Answer» B. PPP can terminate the link only during the link establishment phase | |
| 38. |
A family of network control protocols (NCPs) |
| A. | Are a series of independently defined protocols that provide a dynamic |
| B. | Are a series of independently-defined protocols that encapsulate |
| C. | Are a series of independently defined protocols that provide transparent |
| D. | The same as NFS |
| Answer» C. Are a series of independently defined protocols that provide transparent | |
| 39. |
A Link Control Protocol (LCP) is used for |
| A. | Establishing, configuring and testing the data-link connection |
| B. | Establishing and configuring different network-layer protocols |
| C. | Testing the different network-layer protocols |
| D. | None of the mentioned |
| Answer» B. Establishing and configuring different network-layer protocols | |
| 40. |
The PPP encapsulation |
| A. | Provides for multiplexing of different network-layer protocols |
| B. | Requires framing to indicate the beginning and end of the encapsulation |
| C. | Establishing, configuring and testing the data-link connection |
| D. | None of the mentioned |
| Answer» B. Requires framing to indicate the beginning and end of the encapsulation | |
| 41. |
PPP consists of ________components |
| A. | Three (encapsulating, the Domain Name system) |
| B. | Three ( encapsulating, a link control protocol, NCP ) |
| C. | Two ( a link control protocol, Simple Network Control protocol) |
| D. | None of the mentioned |
| Answer» C. Two ( a link control protocol, Simple Network Control protocol) | |
| 42. |
PPP provides the _______ layer in the TCP/IP suite. |
| A. | Link |
| B. | Network |
| C. | Transport |
| D. | Application |
| Answer» B. Network | |
| 43. |
The PPP protocol |
| A. | Is designed for simple links which transport packets between two peers |
| B. | Is one of the protocols for making an Internet connection over a phone line |
| C. | Both Is designed for simple links which transport packets between two peers & Is one of the protocols for making an Internet connection over a phone line |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 44. |
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network? |
| A. | LCP |
| B. | NCP |
| C. | Both LCP and NCP |
| D. | TCP |
| Answer» D. TCP | |
| 45. |
Which of the following is true of signature-based IDSes? |
| A. | They alert administrators to deviations from “normal” traffic behavior |
| B. | They identify previously unknown attacks |
| C. | The technology is mature and reliable enough to use on production networks |
| D. | They scan network traffic or packets to identify matches with attack-definition files |
| Answer» E. | |
| 46. |
Which of the following is used to provide a baseline measure for comparison of IDSes? |
| A. | Crossover error rate |
| B. | False negative rate |
| C. | False positive rate |
| D. | Bit error rate |
| Answer» B. False negative rate | |
| 47. |
“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers? |
| A. | Application layer |
| B. | Network layer |
| C. | Session layer |
| D. | both Application layer and Session layer |
| Answer» E. | |
| 48. |
When discussing IDS/IPS, what is a signature? |
| A. | An electronic signature used to authenticate the identity of a user on the network |
| B. | Attack-definition file |
| C. | It refers to “normal,” baseline network behavior |
| D. | None of the above |
| Answer» C. It refers to “normal,” baseline network behavior | |
| 49. |
An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component? |
| A. | Inspection of password files to detect inadvisable passwords |
| B. | Mechanisms put in place to reenact known methods of attack and record system responses |
| C. | Inspection of system to detect policy violations |
| D. | Inspection of configuration files to detect inadvisable settings |
| Answer» C. Inspection of system to detect policy violations | |
| 50. |
At which two traffic layers do most commercial IDSes generate signatures? |
| A. | Application layer |
| B. | Network layer |
| C. | Transport layer |
| D. | both Transport layer and Network layer |
| Answer» E. | |