

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
101. |
In a piconet, there can be up to ________ parked nodes in the net. |
A. | 63 |
B. | 127 |
C. | 255 |
D. | 511 |
Answer» D. 511 | |
102. |
An interconnected collection of piconet is called |
A. | scatternet |
B. | micronet |
C. | mininet |
D. | none of the mentioned |
Answer» B. micronet | |
103. |
Which one of the following is not used in media access control? |
A. | ethernet |
B. | digital subscriber line |
C. | fiber distributed data interface |
D. | none of the mentioned |
Answer» E. | |
104. |
Which protocol assigns IP address to the client connected in the internet? |
A. | DHCP |
B. | IP |
C. | RPC |
D. | none of the mentioned |
Answer» B. IP | |
105. |
Which one of the following is not an application layer protocol used in internet? |
A. | remote procedure call |
B. | internet relay chat |
C. | resource reservation protocol |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
106. |
Internet works on |
A. | packet switching |
B. | circuit switching |
C. | both packet switching and circuit switching |
D. | none of the mentioned |
Answer» B. circuit switching | |
107. |
IPv6 addressed have a size of |
A. | 32 bits |
B. | 64 bits |
C. | 128 bits |
D. | 265 bits |
Answer» D. 265 bits | |
108. |
Which one of the following protocol is not used in internet? |
A. | HTTP |
B. | DHCP |
C. | DNS |
D. | None of the mentioned |
Answer» E. | |
109. |
ISP exchanges internet traffic between their networks by |
A. | internet exchange point |
B. | subscriber end point |
C. | isp end point |
D. | none of the mentioned |
Answer» B. subscriber end point | |
110. |
Internet access by transmitting digital data over the wires of a local telephone network is provided by |
A. | leased line |
B. | digital subscriber line |
C. | digital signal line |
D. | none of the mentioned |
Answer» C. digital signal line | |
111. |
To join the internet, the computer has to be connected to a |
A. | internet architecture board |
B. | internet society |
C. | internet service provider |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
112. |
What is internet? |
A. | a single network |
B. | a vast collection of different networks |
C. | interconnection of local area networks |
D. | none of the mentioned |
Answer» C. interconnection of local area networks | |
113. |
What is WPA? |
A. | wi-fi protected access |
B. | wired protected access |
C. | wired process access |
D. | wi-fi process access |
Answer» B. wired protected access | |
114. |
What is Wired Equivalent Privacy (WEP) ? |
A. | security algorithm for ethernet |
B. | security algorithm for wireless networks |
C. | security algorithm for usb communication |
D. | none of the mentioned |
Answer» C. security algorithm for usb communication | |
115. |
Which one of the following event is not possible in wireless LAN. |
A. | collision detection |
B. | acknowledgement of data frames |
C. | multi-mode data transmission |
D. | none of the mentioned |
Answer» B. acknowledgement of data frames | |
116. |
Mostly ________ is used in wireless LAN. |
A. | time division multiplexing |
B. | orthogonal frequency division multiplexing |
C. | space division multiplexing |
D. | none of the mentioned |
Answer» C. space division multiplexing | |
117. |
In wireless network an extended service set is a set of |
A. | connected basic service sets |
B. | all stations |
C. | all access points |
D. | none of the mentioned |
Answer» B. all stations | |
118. |
A wireless network interface controller can work in |
A. | infrastructure mode |
B. | ad-hoc mode |
C. | both infrastructure mode and ad-hoc mode |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
119. |
In wireless distribution system |
A. | multiple access point are inter-connected with each other |
B. | there is no access point |
C. | only one access point exists |
D. | none of the mentioned |
Answer» B. there is no access point | |
120. |
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? |
A. | CDMA |
B. | CSMA/CA |
C. | ALOHA |
D. | None of the mentioned |
Answer» C. ALOHA | |
121. |
In wireless ad-hoc network |
A. | access point is not required |
B. | access point is must |
C. | nodes are not required |
D. | none of the mentioned |
Answer» B. access point is must | |
122. |
What is the access point (AP) in wireless LAN? |
A. | device that allows wireless devices to connect to a wired network |
B. | wireless devices itself |
C. | both device that allows wireless devices to connect to a wired network and wireless devices itself |
D. | none of the mentioned |
Answer» B. wireless devices itself | |
123. |
An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called |
A. | short frame |
B. | run frame |
C. | mini frame |
D. | man frame |
Answer» C. mini frame | |
124. |
What is interframe gap? |
A. | idle time between frames |
B. | dle time between frame bits |
C. | idle time between packets |
D. | none of the mentioned |
Answer» B. dle time between frame bits | |
125. |
The maximum size of payload field in ethernet frame is |
A. | 1000 bytes |
B. | 1200 bytes |
C. | 1300 bytes |
D. | 1500 bytes |
Answer» E. | |
126. |
High speed ethernet works on |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
127. |
A point-to-point protocol over ethernet is a network protocol for |
A. | encapsulating PPP frames inside ethernet frames |
B. | encapsulating ehternet framse inside PPP frames |
C. | for security of ethernet frames |
D. | for security of PPP frames |
Answer» B. encapsulating ehternet framse inside PPP frames | |
128. |
Ethernet in metropolitan area network (MAN) can be used as |
A. | pure ethernet |
B. | ethernet over SDH |
C. | ethernet over MPLS |
D. | all of the mentioned |
Answer» E. | |
129. |
What is autonegotiation? |
A. | a procedure by which two connected devices choose common transmission parameters |
B. | a security algorithm |
C. | a routing algorithm |
D. | none of the mentioned |
Answer» B. a security algorithm | |
130. |
MAC address is of |
A. | 24 bits |
B. | 36 bits |
C. | 42 bits |
D. | 48 bits |
Answer» E. | |
131. |
What is stat frame delimeter (SFD) in ethernet frame? |
A. | 10101010 |
B. | 10101011 |
C. | 00000000 |
D. | 11111111 |
Answer» C. 00000000 | |
132. |
Ethernet frame consists of |
A. | MAC address |
B. | IP address |
C. | both MAC address and IP address |
D. | none of the mentioned |
Answer» B. IP address | |
133. |
Choose the wrong statement |
A. | Nslookup is used to query a DNS server for DNS data |
B. | Ping is used to check connectivity |
C. | Pathping combines the functionality of ping with that of route |
D. | Ifconfig can configure TCP/IP network interface parameters |
Answer» D. Ifconfig can configure TCP/IP network interface parameters | |
134. |
This allows to check if a domain is available for registration. |
A. | Domain Check |
B. | Domain Dossier |
C. | Domain Lookup |
D. | None of the mentioned |
Answer» B. Domain Dossier | |
135. |
Which of the following is related to ipconfig in Microsoft Windows ? |
A. | Display all current TCP/IP network configuration values |
B. | Modify DHCP settings |
C. | Modify DNS settings |
D. | All of the mentioned |
Answer» E. | |
136. |
If you want to find the number of routers between a source and destination, the utility to be used is. |
A. | route |
B. | Ipconfig |
C. | Ifconfig |
D. | Traceroute |
Answer» E. | |
137. |
__________ command is used to manipulate TCP/IP routing table. |
A. | route |
B. | Ipconfig |
C. | Ifconfig |
D. | Traceroute |
Answer» B. Ipconfig | |
138. |
ICMP is used in |
A. | Ping |
B. | Traceroute |
C. | Ifconfig |
D. | Both Ping & Traceroute |
Answer» E. | |
139. |
Ping sweep is a part of |
A. | Traceroute |
B. | Nmap |
C. | Route |
D. | Ipconfig |
Answer» C. Route | |
140. |
Ping can |
A. | Measure round-trip time |
B. | Report packet loss |
C. | Report latency |
D. | All of the mentioned |
Answer» C. Report latency | |
141. |
A network management system can be divided into |
A. | three categories |
B. | five broad categories |
C. | seven broad categories |
D. | ten broad categories |
Answer» C. seven broad categories | |
142. |
MIB is a collection of groups of objects that can be managed by |
A. | SMTP |
B. | UDP |
C. | SNMP |
D. | TCP/IP |
Answer» D. TCP/IP | |
143. |
In Network Management System, maps track each piece of hardware and its connection to the |
A. | IP Server |
B. | Domain |
C. | Network |
D. | Data |
Answer» D. Data | |
144. |
Which of the following networks supports pipelining effect? |
A. | Circuit-switched networks |
B. | Message-switched networks |
C. | Packet-switched networks |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
145. |
The physical connection between an end point and a switch or between two switches is |
A. | Transmission path |
B. | Virtual path |
C. | Virtual circuit |
D. | None of the mentioned |
Answer» B. Virtual path | |
146. |
Configuration management can be divided into two subsystems: reconfiguration and |
A. | Documentation |
B. | Information |
C. | Servers |
D. | Entity |
Answer» B. Information | |
147. |
Performance management, is closely related to |
A. | Proactive Fault Management |
B. | Fault management |
C. | Reactive Fault Management |
D. | None of the mentioned |
Answer» C. Reactive Fault Management | |
148. |
Complex networks today are made up of hundreds and sometimes thousands of |
A. | Documents |
B. | Components |
C. | Servers |
D. | Entities |
Answer» C. Servers | |
149. |
A firewall needs to be __________ so that it can grow with the network it protects |
A. | Robust |
B. | Expansive |
C. | Fast |
D. | Scalable |
Answer» C. Fast | |
150. |
A stateful firewall maintains a ___________ which is a list of active connections? |
A. | Routing table |
B. | Bridging table |
C. | State table |
D. | Connection table |
Answer» B. Bridging table | |