MCQOPTIONS
Saved Bookmarks
This section includes 97 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
The network established using Bluetooth technology is called a . |
| A. | local area network (lan) |
| B. | wide area network (wan) |
| C. | metropolitan area network (man) |
| D. | personal area network (pan) |
| Answer» E. | |
| 52. |
Open WiFi networks have . |
| A. | a visible name |
| B. | no password |
| C. | visible name without any password |
| D. | none of them |
| Answer» E. | |
| 53. |
Name of a WiFi network may be . |
| A. | visible |
| B. | invisible |
| C. | both a & b |
| D. | none of them |
| Answer» D. none of them | |
| 54. |
WiFi networks have for connecting. |
| A. | name |
| B. | password |
| C. | both a & b |
| D. | none of them |
| Answer» D. none of them | |
| 55. |
Normally, WiFi signal reach m distance. |
| A. | 50 to 100m |
| B. | 1 to 2m |
| C. | 0.5 to 1.0m |
| D. | 2 to 3m |
| Answer» B. 1 to 2m | |
| 56. |
In terms of data safety, wireless networks are wired networks. |
| A. | more secure than |
| B. | less secure than |
| C. | as safe as |
| D. | none of them |
| Answer» C. as safe as | |
| 57. |
Wireless networks are wired networks. |
| A. | slower than |
| B. | faster than |
| C. | as fast as |
| D. | none of them |
| Answer» B. faster than | |
| 58. |
In the modern days, is the best choice for wireless networking. |
| A. | wifi |
| B. | infrared |
| C. | radio waves |
| D. | micro-wave |
| Answer» B. infrared | |
| 59. |
Wireless networks communicate using signal instead of cables. |
| A. | infrared |
| B. | low frequency radio wave |
| C. | wireless fidelity (wifi - ieee 802.11 standard) |
| D. | all of them |
| Answer» E. | |
| 60. |
Fibre optic cables are interferences from electric cables and electromagnetic waves. |
| A. | prone to |
| B. | unaffected by |
| C. | susceptible to |
| D. | affected by |
| Answer» C. susceptible to | |
| 61. |
The device which connects one Local Area Network to another Local Area Network is called |
| A. | hub |
| B. | switch |
| C. | modem |
| D. | bridge |
| Answer» E. | |
| 62. |
A cable with single copper core and braided metal shield is called . |
| A. | unshielded twisted cable |
| B. | shielded twisted cable |
| C. | coaxial cable |
| D. | fibre optic cable |
| Answer» D. fibre optic cable | |
| 63. |
Switch is to a hub since unwanted repetitions are curtailed. |
| A. | inferior |
| B. | superior |
| C. | equivalent |
| D. | none of them |
| Answer» C. equivalent | |
| 64. |
Hub is to switch/ bridge since it repeats data even to the unwanted connections. |
| A. | inferior |
| B. | superior |
| C. | equivalent |
| D. | none of them |
| Answer» B. superior | |
| 65. |
MODEM is a device used for converting . |
| A. | digital signal to analog |
| B. | analog signal to digital |
| C. | both a & b |
| D. | neither a nor b |
| Answer» D. neither a nor b | |
| 66. |
MODEM is used to convey data over . |
| A. | air |
| B. | telephone line |
| C. | train track |
| D. | bus route |
| Answer» C. train track | |
| 67. |
When network hosts are connected without wires, protocol is used. |
| A. | lan |
| B. | wan |
| C. | man |
| D. | wlan |
| Answer» E. | |
| 68. |
Usually, the network connecting hosts located in several cities or nations is called . |
| A. | lan |
| B. | wan |
| C. | man |
| D. | none of them |
| Answer» C. man | |
| 69. |
Usually, the network connecting hosts inside a single building is called . |
| A. | lan |
| B. | wan |
| C. | man |
| D. | none of them |
| Answer» B. wan | |
| 70. |
When all nodes are connected to a central hub, it is topology. |
| A. | point to point |
| B. | bus |
| C. | star |
| D. | ring |
| Answer» D. ring | |
| 71. |
When 2 devices are connected through a dedicated line, it is topology. |
| A. | point to point |
| B. | bus |
| C. | star |
| D. | ring |
| Answer» B. bus | |
| 72. |
The design adopted for connecting several hosts on a network is called . |
| A. | telephony |
| B. | wiring |
| C. | connection |
| D. | topology |
| Answer» E. | |
| 73. |
Firewall can be implemented through . |
| A. | hardware |
| B. | software |
| C. | both a & b |
| D. | none of them |
| Answer» D. none of them | |
| 74. |
Firewall can . |
| A. | deny access to specific sites |
| B. | allow access to only white listed sites |
| C. | both a & b |
| D. | none of them |
| Answer» D. none of them | |
| 75. |
A program which runs in the background and sends results requested by a client is called a . |
| A. | server |
| B. | client |
| C. | port |
| D. | ip address |
| Answer» B. client | |
| 76. |
Port number on a computer host connected to a network denotes a . |
| A. | background server program |
| B. | client program |
| C. | both a & b |
| D. | none of them |
| Answer» D. none of them | |
| 77. |
IP address helps to a computer connected to a network. |
| A. | uniquely identify |
| B. | format |
| C. | reset |
| D. | reject |
| Answer» B. format | |
| 78. |
Routers help in . |
| A. | transmission of data between networks |
| B. | connecting different devices using appropriate protocol |
| C. | both a & b |
| D. | neither a nor b |
| Answer» D. neither a nor b | |
| 79. |
MODEM stands for . |
| A. | modulation democracy |
| B. | modulation demodulation |
| C. | modern demodulation |
| D. | moderate demodulation |
| Answer» C. modern demodulation | |
| 80. |
are the hardware devices that help the computer to connect to a network. |
| A. | routers |
| B. | modems |
| C. | wireless modems |
| D. | all of them |
| Answer» E. | |
| 81. |
Wireless network connections use technologies. |
| A. | wireless fidelity (wifi) |
| B. | bluetooth |
| C. | both a & b |
| D. | neither a nor b |
| Answer» D. neither a nor b | |
| 82. |
The port for connecting broadband cable to a computer is called . |
| A. | ethernet port |
| B. | registered jack 45 (rj-45) |
| C. | both a & b |
| D. | none of them |
| Answer» D. none of them | |
| 83. |
Most of the wired network connections use . |
| A. | optical fibre cable (ofc) |
| B. | usb cable |
| C. | pen drive |
| D. | hard drive |
| Answer» B. usb cable | |
| 84. |
Computers and devices can be connected using technology to create a network. |
| A. | wired |
| B. | wireless |
| C. | both a & b |
| D. | neither a nor b |
| Answer» D. neither a nor b | |
| 85. |
Internet is constituted of . |
| A. | network of networks |
| B. | hard disk |
| C. | dvd |
| D. | pen drive |
| Answer» B. hard disk | |
| 86. |
The address 2001:db8:a0b:12f0::1 is formatted in . |
| A. | ipv0 |
| B. | ipv2 |
| C. | ipv4 |
| D. | ipv6 |
| Answer» E. | |
| 87. |
Connection to the Internet requires enforcement of security. |
| A. | low |
| B. | high |
| C. | zero |
| D. | no |
| Answer» C. zero | |
| 88. |
Filtering connections and disallowing prohibited connections is carried out using . |
| A. | modem |
| B. | router |
| C. | firewall |
| D. | bridge |
| Answer» D. bridge | |
| 89. |
Second general firewalls operated at layer of the OSI model. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 7 |
| Answer» C. 5 | |
| 90. |
First general firewalls operated at layer of the OSI model. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 7 |
| Answer» B. 4 | |
| 91. |
Third general firewalls operated at layer of the OSI model. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 7 |
| Answer» E. | |
| 92. |
First generation firewalls were otherwise called . |
| A. | packet filters |
| B. | stateful filters |
| C. | application filters |
| D. | none of them |
| Answer» B. stateful filters | |
| 93. |
Second generation firewalls were otherwise called . |
| A. | packet filters |
| B. | stateful filters |
| C. | application filters |
| D. | none of them |
| Answer» C. application filters | |
| 94. |
Third generation firewalls were otherwise called . |
| A. | packet filters |
| B. | stateful filters |
| C. | application filters |
| D. | none of them |
| Answer» D. none of them | |
| 95. |
IPS in firewall stands for . |
| A. | intrusion protection system |
| B. | intrusion prevention software |
| C. | internet prevention system |
| D. | intrusion prevention system |
| Answer» E. | |
| 96. |
The identity management system binds logical addresses to for reputed servers. |
| A. | mac address |
| B. | specific programs |
| C. | other computers |
| D. | none of them |
| Answer» B. specific programs | |
| 97. |
Third generation of firewall offers_ to prevent web fingerprint attacks. |
| A. | web application firewall |
| B. | packet filter |
| C. | stateful filter |
| D. | none of them |
| Answer» B. packet filter | |