Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

1.

In IPv4 layer, datagrams are the

A. Frames
B. Addresses
C. Protocol
D. Packets
Answer» E.
2.

Internet Control Message Protocol (ICMP) is companion of

A. IP Transmission
B. IP Packet
C. IP Frame
D. IP protocol
Answer» E.
3.

A switch in a datagram network uses a

A. destination address
B. sender address
C. routing table
D. header
Answer» D. header
4.

If an Address Resolution Protocol (ARP) request is broadcast, an ARP reply is

A. Universal
B. Unicast
C. Multicast
D. Generated locally
Answer» C. Multicast
5.

IP is a connectionless

A. Source
B. Protocol
C. Station
D. Destination
Answer» C. Station
6.

In Address Resolution Protocol (ARP), a packet is encapsulated directly into a

A. Data link Integer
B. Network Frame
C. Network Station
D. Data link Frame
Answer» E.
7.

In IPv4, value of Maximum Transfer Unit (MTU) depends on the

A. Physical network protocol
B. DataLink network protocol
C. UD protocol
D. Tr
Answer» D. Tr
8.

Asynchronous Transfer Mode (ATM) network is an example of

A. Packet switching network
B. Datagram Networks
C. Virtual circuit network
D. message switched network
Answer» D. message switched network
9.

Switching in Internet is done by using datagram approach to packet switching at the

A. network layer
B. application layer
C. data link layer
D. physical layer.
Answer» B. application layer
10.

Address Resolution Protocol (ARP) is a

A. 8 Bit Field
B. 10 Bit Field
C. 12 Bit Field
D. 16 Bit Field
Answer» E.
11.

Application layer provides basis for

A. Email services
B. Frame Division
C. File Making
D. None of the above
Answer» B. Frame Division
12.

In Address Resolution Protocol (ARP), each LAN has been assigned a

A. Trigger
B. Integer
C. Repeater
D. Process header
Answer» C. Repeater
13.

Parameter that is normally achieved through a trailer added to end of frame is

A. Access Control
B. Flow Control
C. Error Control
D. Physical addressing.
Answer» D. Physical addressing.
14.

The data link layer takes the packets from _________ and encapsulates them into frames fortransmission.

A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» B. physical layer
15.

Internet Control Message Protocol (ICMP) has header size of

A. 12 Bytes
B. 10 Bytes
C. 08 Bytes
D. 06 Bytes
Answer» D. 06 Bytes
16.

Choose “.NET class” name from which data type “UInt” is derived ?

A. System.Int16
B. System.UInt32
C. System.UInt64
D. System.UInt16
Answer» C. System.UInt64
17.

Which of the following architecture uses CSMA/CD access method?

A. ARC net
B. Ethernet
C. Router
D. STP server
Answer» C. Router
18.

What is max data capacity for optical fiber cable?

A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
Answer» D. 10000 mbps
19.

What is the central device in star topology?

A. STP server
B. Hub/switch
C. PDC
D. Router
Answer» C. PDC
20.

Which connector STP uses?

A. BNC
B. RJ-11
C. RJ-45
D. RJ-69
Answer» D. RJ-69
21.

What is the max data capacity of STP?

A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
Answer» C. 1000 mbps
22.

What is the max cable length of STP?

A. 100 ft
B. 200 ft
C. 100 m
D. 200 m
Answer» E.
23.

The __________ portion of LAN management software restricts access, records user activities and audit data etc.

A. Configuration management
B. Security management
C. Performance management
D. None of the mentioned
Answer» C. Performance management
24.

A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________

A. LAN intrinsic software
B. LAN aware software
C. Groupware
D. LAN ignorant software
Answer» B. LAN aware software
25.

STP stands for

A. Shielded twisted pair cable
B. Spanning tree protocol
C. Static transport protocol
D. None of the mentioned
Answer» B. Spanning tree protocol
26.

_____________ allows LAN users to share computer programs and data.

A. Communication server
B. Print server
C. File server
D. Network
Answer» D. Network
27.

In EIGRP best path is known as the successor, where as backup path is known as __________

A. Feasible successor
B. Back-up route
C. Default route
D. There is no backup route in EIGRP
Answer» B. Back-up route
28.

EIGRP uses the ____________ algorithm for finding shortest path.

A. SPF
B. DUAL
C. Linkstat
D. Dikstraalgo
Answer» C. Linkstat
29.

Administrative distance for external EIGRP route is _______

A. 90
B. 170
C. 110
D. 100
Answer» C. 110
30.

For default gateway you will use which of following command on Cisco router?

A. IP default network
B. IP default gateway
C. IP default route
D. Default network
Answer» B. IP default gateway
31.

The EIGRP metric values include:

A. Delay
B. Bandwidth
C. MTU
D. All of the above
Answer» E.
32.

Administrative distance for internal EIGRP is ______

A. 90
B. 170
C. 110
D. 91
Answer» B. 170
33.

EIGRP send the hello message after every ___________ seconds

A. 5 seconds (LAN), 60 seconds (WAN)
B. 5 seconds (LAN), 5 seconds (WAN)
C. 15s
D. 180s
Answer» B. 5 seconds (LAN), 5 seconds (WAN)
34.

EIGRP can support ____________

A. VLSM/subnetting
B. Auto summary
C. Unequal cast load balancing
D. All od the above
Answer» E.
35.

EIGRP metric is ________

A. K-values
B. Bandwidth only
C. Hop Count
D. Delay only
Answer» B. Bandwidth only
36.

The link necessarily begins and ends with this phase. During this phase, the LCP automata will be in INITIAL or STARTING states

A. Link-termination phase
B. Link establishment phase
C. Authentication phase
D. Link dead phase
Answer» E.
37.

Choose one from the following

A. PPP can terminate the link at any time
B. PPP can terminate the link only during the link establishment phase
C. PPP can terminate the link during the authentication phase
D. None of the mentioned
Answer» B. PPP can terminate the link only during the link establishment phase
38.

A family of network control protocols (NCPs)

A. Are a series of independently defined protocols that provide a dynamic
B. Are a series of independently-defined protocols that encapsulate
C. Are a series of independently defined protocols that provide transparent
D. The same as NFS
Answer» C. Are a series of independently defined protocols that provide transparent
39.

A Link Control Protocol (LCP) is used for

A. Establishing, configuring and testing the data-link connection
B. Establishing and configuring different network-layer protocols
C. Testing the different network-layer protocols
D. None of the mentioned
Answer» B. Establishing and configuring different network-layer protocols
40.

The PPP encapsulation

A. Provides for multiplexing of different network-layer protocols
B. Requires framing to indicate the beginning and end of the encapsulation
C. Establishing, configuring and testing the data-link connection
D. None of the mentioned
Answer» B. Requires framing to indicate the beginning and end of the encapsulation
41.

PPP consists of ________components

A. Three (encapsulating, the Domain Name system)
B. Three ( encapsulating, a link control protocol, NCP )
C. Two ( a link control protocol, Simple Network Control protocol)
D. None of the mentioned
Answer» C. Two ( a link control protocol, Simple Network Control protocol)
42.

PPP provides the _______ layer in the TCP/IP suite.

A. Link
B. Network
C. Transport
D. Application
Answer» B. Network
43.

The PPP protocol

A. Is designed for simple links which transport packets between two peers
B. Is one of the protocols for making an Internet connection over a phone line
C. Both Is designed for simple links which transport packets between two peers & Is one of the protocols for making an Internet connection over a phone line
D. None of the mentioned
Answer» D. None of the mentioned
44.

Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?

A. LCP
B. NCP
C. Both LCP and NCP
D. TCP
Answer» D. TCP
45.

Which of the following is true of signature-based IDSes?

A. They alert administrators to deviations from “normal” traffic behavior
B. They identify previously unknown attacks
C. The technology is mature and reliable enough to use on production networks
D. They scan network traffic or packets to identify matches with attack-definition files
Answer» E.
46.

Which of the following is used to provide a baseline measure for comparison of IDSes?

A. Crossover error rate
B. False negative rate
C. False positive rate
D. Bit error rate
Answer» B. False negative rate
47.

“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?

A. Application layer
B. Network layer
C. Session layer
D. both Application layer and Session layer
Answer» E.
48.

When discussing IDS/IPS, what is a signature?

A. An electronic signature used to authenticate the identity of a user on the network
B. Attack-definition file
C. It refers to “normal,” baseline network behavior
D. None of the above
Answer» C. It refers to “normal,” baseline network behavior
49.

An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?

A. Inspection of password files to detect inadvisable passwords
B. Mechanisms put in place to reenact known methods of attack and record system responses
C. Inspection of system to detect policy violations
D. Inspection of configuration files to detect inadvisable settings
Answer» C. Inspection of system to detect policy violations
50.

At which two traffic layers do most commercial IDSes generate signatures?

A. Application layer
B. Network layer
C. Transport layer
D. both Transport layer and Network layer
Answer» E.