

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
1. |
In IPv4 layer, datagrams are the |
A. | Frames |
B. | Addresses |
C. | Protocol |
D. | Packets |
Answer» E. | |
2. |
Internet Control Message Protocol (ICMP) is companion of |
A. | IP Transmission |
B. | IP Packet |
C. | IP Frame |
D. | IP protocol |
Answer» E. | |
3. |
A switch in a datagram network uses a |
A. | destination address |
B. | sender address |
C. | routing table |
D. | header |
Answer» D. header | |
4. |
If an Address Resolution Protocol (ARP) request is broadcast, an ARP reply is |
A. | Universal |
B. | Unicast |
C. | Multicast |
D. | Generated locally |
Answer» C. Multicast | |
5. |
IP is a connectionless |
A. | Source |
B. | Protocol |
C. | Station |
D. | Destination |
Answer» C. Station | |
6. |
In Address Resolution Protocol (ARP), a packet is encapsulated directly into a |
A. | Data link Integer |
B. | Network Frame |
C. | Network Station |
D. | Data link Frame |
Answer» E. | |
7. |
In IPv4, value of Maximum Transfer Unit (MTU) depends on the |
A. | Physical network protocol |
B. | DataLink network protocol |
C. | UD protocol |
D. | Tr |
Answer» D. Tr | |
8. |
Asynchronous Transfer Mode (ATM) network is an example of |
A. | Packet switching network |
B. | Datagram Networks |
C. | Virtual circuit network |
D. | message switched network |
Answer» D. message switched network | |
9. |
Switching in Internet is done by using datagram approach to packet switching at the |
A. | network layer |
B. | application layer |
C. | data link layer |
D. | physical layer. |
Answer» B. application layer | |
10. |
Address Resolution Protocol (ARP) is a |
A. | 8 Bit Field |
B. | 10 Bit Field |
C. | 12 Bit Field |
D. | 16 Bit Field |
Answer» E. | |
11. |
Application layer provides basis for |
A. | Email services |
B. | Frame Division |
C. | File Making |
D. | None of the above |
Answer» B. Frame Division | |
12. |
In Address Resolution Protocol (ARP), each LAN has been assigned a |
A. | Trigger |
B. | Integer |
C. | Repeater |
D. | Process header |
Answer» C. Repeater | |
13. |
Parameter that is normally achieved through a trailer added to end of frame is |
A. | Access Control |
B. | Flow Control |
C. | Error Control |
D. | Physical addressing. |
Answer» D. Physical addressing. | |
14. |
The data link layer takes the packets from _________ and encapsulates them into frames fortransmission. |
A. | network layer |
B. | physical layer |
C. | transport layer |
D. | application layer |
Answer» B. physical layer | |
15. |
Internet Control Message Protocol (ICMP) has header size of |
A. | 12 Bytes |
B. | 10 Bytes |
C. | 08 Bytes |
D. | 06 Bytes |
Answer» D. 06 Bytes | |
16. |
Choose “.NET class” name from which data type “UInt” is derived ? |
A. | System.Int16 |
B. | System.UInt32 |
C. | System.UInt64 |
D. | System.UInt16 |
Answer» C. System.UInt64 | |
17. |
Which of the following architecture uses CSMA/CD access method? |
A. | ARC net |
B. | Ethernet |
C. | Router |
D. | STP server |
Answer» C. Router | |
18. |
What is max data capacity for optical fiber cable? |
A. | 10 mbps |
B. | 100 mbps |
C. | 1000 mbps |
D. | 10000 mbps |
Answer» D. 10000 mbps | |
19. |
What is the central device in star topology? |
A. | STP server |
B. | Hub/switch |
C. | PDC |
D. | Router |
Answer» C. PDC | |
20. |
Which connector STP uses? |
A. | BNC |
B. | RJ-11 |
C. | RJ-45 |
D. | RJ-69 |
Answer» D. RJ-69 | |
21. |
What is the max data capacity of STP? |
A. | 10 mbps |
B. | 100 mbps |
C. | 1000 mbps |
D. | 10000 mbps |
Answer» C. 1000 mbps | |
22. |
What is the max cable length of STP? |
A. | 100 ft |
B. | 200 ft |
C. | 100 m |
D. | 200 m |
Answer» E. | |
23. |
The __________ portion of LAN management software restricts access, records user activities and audit data etc. |
A. | Configuration management |
B. | Security management |
C. | Performance management |
D. | None of the mentioned |
Answer» C. Performance management | |
24. |
A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________ |
A. | LAN intrinsic software |
B. | LAN aware software |
C. | Groupware |
D. | LAN ignorant software |
Answer» B. LAN aware software | |
25. |
STP stands for |
A. | Shielded twisted pair cable |
B. | Spanning tree protocol |
C. | Static transport protocol |
D. | None of the mentioned |
Answer» B. Spanning tree protocol | |
26. |
_____________ allows LAN users to share computer programs and data. |
A. | Communication server |
B. | Print server |
C. | File server |
D. | Network |
Answer» D. Network | |
27. |
In EIGRP best path is known as the successor, where as backup path is known as __________ |
A. | Feasible successor |
B. | Back-up route |
C. | Default route |
D. | There is no backup route in EIGRP |
Answer» B. Back-up route | |
28. |
EIGRP uses the ____________ algorithm for finding shortest path. |
A. | SPF |
B. | DUAL |
C. | Linkstat |
D. | Dikstraalgo |
Answer» C. Linkstat | |
29. |
Administrative distance for external EIGRP route is _______ |
A. | 90 |
B. | 170 |
C. | 110 |
D. | 100 |
Answer» C. 110 | |
30. |
For default gateway you will use which of following command on Cisco router? |
A. | IP default network |
B. | IP default gateway |
C. | IP default route |
D. | Default network |
Answer» B. IP default gateway | |
31. |
The EIGRP metric values include: |
A. | Delay |
B. | Bandwidth |
C. | MTU |
D. | All of the above |
Answer» E. | |
32. |
Administrative distance for internal EIGRP is ______ |
A. | 90 |
B. | 170 |
C. | 110 |
D. | 91 |
Answer» B. 170 | |
33. |
EIGRP send the hello message after every ___________ seconds |
A. | 5 seconds (LAN), 60 seconds (WAN) |
B. | 5 seconds (LAN), 5 seconds (WAN) |
C. | 15s |
D. | 180s |
Answer» B. 5 seconds (LAN), 5 seconds (WAN) | |
34. |
EIGRP can support ____________ |
A. | VLSM/subnetting |
B. | Auto summary |
C. | Unequal cast load balancing |
D. | All od the above |
Answer» E. | |
35. |
EIGRP metric is ________ |
A. | K-values |
B. | Bandwidth only |
C. | Hop Count |
D. | Delay only |
Answer» B. Bandwidth only | |
36. |
The link necessarily begins and ends with this phase. During this phase, the LCP automata will be in INITIAL or STARTING states |
A. | Link-termination phase |
B. | Link establishment phase |
C. | Authentication phase |
D. | Link dead phase |
Answer» E. | |
37. |
Choose one from the following |
A. | PPP can terminate the link at any time |
B. | PPP can terminate the link only during the link establishment phase |
C. | PPP can terminate the link during the authentication phase |
D. | None of the mentioned |
Answer» B. PPP can terminate the link only during the link establishment phase | |
38. |
A family of network control protocols (NCPs) |
A. | Are a series of independently defined protocols that provide a dynamic |
B. | Are a series of independently-defined protocols that encapsulate |
C. | Are a series of independently defined protocols that provide transparent |
D. | The same as NFS |
Answer» C. Are a series of independently defined protocols that provide transparent | |
39. |
A Link Control Protocol (LCP) is used for |
A. | Establishing, configuring and testing the data-link connection |
B. | Establishing and configuring different network-layer protocols |
C. | Testing the different network-layer protocols |
D. | None of the mentioned |
Answer» B. Establishing and configuring different network-layer protocols | |
40. |
The PPP encapsulation |
A. | Provides for multiplexing of different network-layer protocols |
B. | Requires framing to indicate the beginning and end of the encapsulation |
C. | Establishing, configuring and testing the data-link connection |
D. | None of the mentioned |
Answer» B. Requires framing to indicate the beginning and end of the encapsulation | |
41. |
PPP consists of ________components |
A. | Three (encapsulating, the Domain Name system) |
B. | Three ( encapsulating, a link control protocol, NCP ) |
C. | Two ( a link control protocol, Simple Network Control protocol) |
D. | None of the mentioned |
Answer» C. Two ( a link control protocol, Simple Network Control protocol) | |
42. |
PPP provides the _______ layer in the TCP/IP suite. |
A. | Link |
B. | Network |
C. | Transport |
D. | Application |
Answer» B. Network | |
43. |
The PPP protocol |
A. | Is designed for simple links which transport packets between two peers |
B. | Is one of the protocols for making an Internet connection over a phone line |
C. | Both Is designed for simple links which transport packets between two peers & Is one of the protocols for making an Internet connection over a phone line |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
44. |
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network? |
A. | LCP |
B. | NCP |
C. | Both LCP and NCP |
D. | TCP |
Answer» D. TCP | |
45. |
Which of the following is true of signature-based IDSes? |
A. | They alert administrators to deviations from “normal” traffic behavior |
B. | They identify previously unknown attacks |
C. | The technology is mature and reliable enough to use on production networks |
D. | They scan network traffic or packets to identify matches with attack-definition files |
Answer» E. | |
46. |
Which of the following is used to provide a baseline measure for comparison of IDSes? |
A. | Crossover error rate |
B. | False negative rate |
C. | False positive rate |
D. | Bit error rate |
Answer» B. False negative rate | |
47. |
“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers? |
A. | Application layer |
B. | Network layer |
C. | Session layer |
D. | both Application layer and Session layer |
Answer» E. | |
48. |
When discussing IDS/IPS, what is a signature? |
A. | An electronic signature used to authenticate the identity of a user on the network |
B. | Attack-definition file |
C. | It refers to “normal,” baseline network behavior |
D. | None of the above |
Answer» C. It refers to “normal,” baseline network behavior | |
49. |
An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component? |
A. | Inspection of password files to detect inadvisable passwords |
B. | Mechanisms put in place to reenact known methods of attack and record system responses |
C. | Inspection of system to detect policy violations |
D. | Inspection of configuration files to detect inadvisable settings |
Answer» C. Inspection of system to detect policy violations | |
50. |
At which two traffic layers do most commercial IDSes generate signatures? |
A. | Application layer |
B. | Network layer |
C. | Transport layer |
D. | both Transport layer and Network layer |
Answer» E. | |