Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

251.

Which command displays RIP routing updates?

A. Show IP route
B. Debug IP rip
C. Show protocols
D. Debug IP route
Answer» C. Show protocols
252.

How often does a RIPv1 router broadcast its routing table by default?

A. Every 30 seconds
B. Every 60 seconds
C. Every 90 seconds
D. RIPv1 does not broadcast periodically
Answer» B. Every 60 seconds
253.

Which protocol should you select if the network diameter is more than 17 hops?

A. RIPv1
B. RIPv2
C. EIGRP
D. Both RIPv1 and RIPv2
Answer» B. RIPv2
254.

In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the two metrics.

A. Ticks & Hops
B. Hops & Loops
C. Loops & Counts
D. Counts & Ticks
Answer» B. Hops & Loops
255.

Novell’s implementation of RIP updates routing tables every _________ seconds.

A. 60
B. 90
C. 10
D. 30
Answer» B. 90
256.

To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?

A. Each router builds its own SAP table and forwards that every 60 seconds
B. Each router assigns a service number and broadcasts that
C. SAPs aren’t necessary with Cisco routers
D. Cisco routers filter out all SAPs
Answer» B. Each router assigns a service number and broadcasts that
257.

You want to enable both arpa and snap encapsulation on one router interface. How do you do this?

A. The interface can handle multiple encapsulation types with no extra configuration
B. Assign two network numbers, one for each encapsulation type
C. Enable Novell-ether to run multiple encapsulation types
D. Both arpa and snap are enabled by default so you don’t have to configure anything
Answer» C. Enable Novell-ether to run multiple encapsulation types
258.

What does the “IPX maximum-paths 2” command accomplish?

A. It enables load sharing on 2 paths if the paths are equal metric paths
B. It sets up routing to go to network 2
C. It is the default for Cisco IPX load sharing
D. It enables load sharing on 2 paths if the paths are unequal metric paths
Answer» B. It sets up routing to go to network 2
259.

As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?

A. Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface Ethernet 0.2 IPX network 6c
B. Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e interface Ethernet 0 IPX encapsulation sap IPX network 6c
C. Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX encapsulation sap
D. Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e interface Ethernet 0.2 IPX encapsulation sap IPX network 6c
Answer» E.
260.

The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings?

A. For LAN interfaces, one tick; for WAN interfaces, six ticks
B. For LAN interfaces, six ticks; for WAN interfaces, one tick
C. For LAN interfaces, zero ticks; for WAN interfaces, five ticks
D. For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
Answer» B. For LAN interfaces, six ticks; for WAN interfaces, one tick
261.

What does the following series of commands accomplish? RouterIGRP 71 network 10.0.0.0 router IGRP 109 network 172.68.7.0

A. It isolates networks 10.0.0.0 and 172.68.7.0
B. It loads IGRP for networks 109 and 71
C. It disables RIP
D. It disables all routing protocols
Answer» B. It loads IGRP for networks 109 and 71
262.

As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?

A. Debug IP IGRP event
B. Debug IP IGRP-events
C. Debug IP IGRP summary
D. Debug IP IGRP events
Answer» E.
263.

Which NetWare protocol provides link-state routing?

A. NLSP
B. RIP
C. SAP
D. NCP
Answer» B. RIP
264.

Which NetWare protocol works on layer 3–network layer—of the OSI model?

A. IPX
B. NCP
C. SPX
D. NetBIOS
Answer» B. NCP
265.

NetWare IPX addressing uses a network number and a node number. Which statement is not true?

A. The network address is administratively assigned and can be up to 16 hexadecimal digits long
B. The node address is always administratively assigned
C. The node address is usually the MAC address
D. If the MAC address is used as the node address, then IPX eliminates the use of ARP
Answer» C. The node address is usually the MAC address
266.

You are a system administrator on a NetWare network, you are runningNetWare 4.11 and you cannot communicate with your router. What is the likelyproblem?

A. NetWare 4.11 defaults to 802.2 encapsulation
B. NetWare 4.11 defaults to 802.3 encapsulation
C. Cisco routers only work with NetWare 3.11
D. NetWare 3.11 defaults to 802.2 encapsulation
Answer» B. NetWare 4.11 defaults to 802.3 encapsulation
267.

Which type of Ethernet framing is used for TCP/IP and DEC net?

A. Ethernet 802.3
B. Ethernet 802.2
C. Ethernet II
D. Ethernet SNAP
Answer» D. Ethernet SNAP
268.

The network address of 172.16.0.0/19 provides how many subnets and hosts?

A. 7 subnets, 30 hosts each
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
Answer» C. 8 subnets, 2,046 hosts each
269.

What is the subnetwork number of a host with an IP address of 172.16.66.0/21?

A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer» D. 172.16.0.0
270.

You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?

A. 6
B. 8
C. 30
D. 32
Answer» B. 8
271.

If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?

A. 172.16.112.0
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
Answer» B. 172.16.0.0
272.

You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?

A. 2
B. 3
C. 4
D. 5
Answer» E.
273.

You need to subnet a network that has 5 subnets, each with at least 16 hosts. Wohich classful subnet mask would you use

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer» C. 255.255.255.240
274.

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

A. 14
B. 15
C. 16
D. 30
Answer» E.
275.

Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router? 1. 172.16.1.100 2. 172.16.1.198 3. 172.16.2.255 4. 172.16.3.0

A. 1 only
B. 2 and 3 only
C. 3 and 4 only
D. None of the mentioned
Answer» D. None of the mentioned
276.

_________ is another kind of fiber optic network with an active star for switching.

A. S/NET
B. SW/NET
C. NET/SW
D. FS/NET
Answer» B. SW/NET
277.

_________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.

A. Ethernet
B. Fast Ethernet
C. Gigabit Ethernet
D. All of the mentioned
Answer» C. Gigabit Ethernet
278.

Which of the following are Gigabit Ethernets?

A. 1000 BASE-SX
B. 1000 BASE-SX
C. 1000 BASE-CX
D. all of the above
Answer» E.
279.

__________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected. a) FDDI

A. FDDI FDDT
B. FDDT
C. FDDR
D. FOTR
Answer» B. FDDT
280.

State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The any cast service is included in IPV6.

A. True, True
B. True, False
C. False, True
D. False, False
Answer» B. True, False
281.

_________ implies that all subnets obtained from the same subnet mask.

A. Static subnetting
B. Dynamic subnetting
C. Variable length subnetting
D. Both Dynamic subnetting and Variable length subnetting
Answer» B. Dynamic subnetting
282.

The combination of _________ and __________ is often termed the local address of the local portion of the IP address.

A. Network number and host number
B. Network number and subnet number
C. Subnet number and host number
D. Host number
Answer» D. Host number
283.

If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?

A. 255.255.255.252
B. 255.255.255.255
C. 255.255.255.240
D. 255.255.255.248
Answer» D. 255.255.255.248
284.

You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?

A. Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
B. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
C. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
D. Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
Answer» C. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
285.

Which of the following is the broadcast address for a Class B network ID using the default subnetmask?

A. 172.16.10.255
B. 255.255.255.255
C. 172.16.255.255
D. 172.255.255.255
Answer» D. 172.255.255.255
286.

Which are the features present in IPv4 but not in IPv6?

A. Fragmentation
B. Header checksum
C. Options
D. All of the mentioned
Answer» E.
287.

IPv6 does not use ________ type of address

A. Broadcast
B. Multicast
C. Any cast
D. None of the mentioned
Answer» B. Multicast
288.

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A. Fragmentation field
B. Fast switching
C. TOS field
D. Option field
Answer» D. Option field
289.

If the value in protocol field is 17, the transport layer protocol used is _________

A. TCP
B. UDP
C. Either TCP and UDP
D. None of the mentioned
Answer» C. Either TCP and UDP
290.

Which of the following is not the step in Header translation procedure?

A. The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits
B. The value of the IPv6 priority field is discarded
C. The type of service field in IPv4 is set to zero
D. The IPv6 flow label is considered
Answer» E.
291.

Header translation uses ___________ to translate an IPv6 address to an IPv4 address.

A. IP address
B. Physical address
C. Mapped address
D. Any of the mentioned
Answer» D. Any of the mentioned
292.

___________ is necessary when the sender wants to use IPv6, but the receiver does not understand IPv6.

A. Dual stack
B. Header translation
C. Conversion
D. Tunnelling
Answer» C. Conversion
293.

The correct format of packet in tunnel that uses IPv4 region is 1. IPv6 header 2. Payload 3. IPv4 header

A. 3-1-2
B. 3-2-1
C. 1-2-3
D. 1-3-2
Answer» B. 3-2-1
294.

The strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4 is

A. Dual stack
B. Header translation
C. Conversion
D. Tunnelling
Answer» E.
295.

To determine which version to use when sending a packet to a destination, the source host queries which of the following?

A. Dual stack
B. Domain Name Server
C. Header information
D. All of the mentioned
Answer» C. Header information
296.

Which of the following is not a transition strategies?

A. Dual stack
B. Tunnelling
C. Conversion
D. Header translation
Answer» D. Header translation
297.

The main reason for transition from IPv4 to IPv6 is

A. Huge number of systems on the internet
B. Very low number of system on the internet
C. Providing standard address
D. None of the mentioned
Answer» B. Very low number of system on the internet
298.

In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is

A. 10101111 10100011
B. 01010000 01011100
C. 10101111 01011100
D. 01010000 10100011
Answer» B. 01010000 01011100
299.

In windows, ____________ can be used to trace the route of the packet from the source to the destination

A. Traceroute
B. Tracert
C. Ping
D. Locater
Answer» C. Ping
300.

During debugging, we can use the ____________ program to find if a host is alive and responding

A. Traceroute
B. Shell
C. Ping
D. Java
Answer» D. Java