Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?

A. session initiation protocol
B. session modelling protocol
C. session maintenance protocol
D. none of the mentioned
Answer» B. session modelling protocol
2.

Which one of the following is not an application layer protocol?

A. media gateway protocol
B. dynamic host configuration protocol
C. resource reservation protocol
D. session initiation protocol
Answer» D. session initiation protocol
3.

Which one of the following is an internet standard protocol for managing devices on IP network?

A. dynamic host configuration protocol
B. simple newtwork management protocol
C. internet message access protocol
D. media gateway protocol
Answer» C. internet message access protocol
4.

The ASCII encoding of binary data is called

A. base 64 encoding
B. base 32 encoding
C. base 16 encoding
D. base 8 encoding
Answer» B. base 32 encoding
5.

Which one of the following protocol delivers/stores mail to reciever server?

A. simple mail transfer protocol
B. post office protocol
C. internet mail access protocol
D. hypertext transfer protocol
Answer» B. post office protocol
6.

Application layer protocol defines

A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Answer» E.
7.

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

A. http
B. ftp
C. telnet
D. none of the mentioned
Answer» D. none of the mentioned
8.

The ____ translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» B. routing information protocol
9.

Bits can be send over guided and unguided media as analog signal by

A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» B. amplitude modulation
10.

Which transmission media has the highest transmission speed in a network?

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» D. electrical cable
11.

Which address identifies a process on a host?

A. physical address
B. logical address
C. port address
D. specific address
Answer» D. specific address
12.

Which layer is responsible for process to process delivery?

A. network layer
B. transport layer
C. session layer
D. data link layer
Answer» C. session layer
13.

Which address is used in an internet employing the TCP/IP protocols?

A. physical address and logical address
B. port address
C. specific address
D. all of the mentioned
Answer» E.
14.

Which layer links the network support layers and user support layers

A. session layer
B. data link layer
C. transport layer
D. network layer
Answer» D. network layer
15.

TCP/IP model does not have ______ layer but OSI model have this layer.

A. session layer
B. presentation layer
C. application layer
D. both (a) and (b)
Answer» E.
16.

The OSI model has ___ layers.

A. 4
B. 5
C. 6
D. 7
Answer» E.
17.

A _____ is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B. firewall
C. router
D. all of the mentioned
Answer» D. all of the mentioned
18.

EIGRP uses the ____________ algorithm for finding shortest path.

A. spf
B. dual
C. linkstat
D. djikstra’s
Answer» C. linkstat
19.

Administrative distance for external EIGRP route is _______

A. 90
B. 170
C. 110
D. 100
Answer» C. 110
20.

For default gateway, which of following commands will you use on a Cisco router?

A. ip default network
B. ip default gateway
C. ip default route
D. default network
Answer» B. ip default gateway
21.

The EIGRP metric values include:

A. delay
B. bandwidth
C. mtu
D. all of the mentioned
Answer» E.
22.

Administrative distance for internal EIGRP is ______

A. 90
B. 170
C. 110
D. 91
Answer» B. 170
23.

EIGRP sends a hello message after every ___________ seconds.

A. 5 seconds (lan), 60 seconds (wan)
B. 5 seconds (lan), 5 seconds (wan)
C. 15s
D. 180s
Answer» B. 5 seconds (lan), 5 seconds (wan)
24.

EIGRP metric is ________

A. k-values
B. bandwidth only
C. hop count
D. delay only
Answer» B. bandwidth only
25.

Choose the correct statement from the following.

A. ppp can terminate the link at any time
B. ppp can terminate the link only during the link establishment phase
C. ppp can terminate the link during the authentication phase
D. ppp can terminate the link during the callback control phase
Answer» B. ppp can terminate the link only during the link establishment phase
26.

A family of network control protocols (NCPs) ____________

A. are a series of independently defined protocols that provide a dynamic
B. are a series of independently-defined protocols that encapsulate
C. are a series of independently defined protocols that provide transparent
D. the same as nfs
Answer» C. are a series of independently defined protocols that provide transparent
27.

A Link Control Protocol (LCP) is used for ____________

A. establishing, configuring and testing the data-link connection
B. establishing and configuring different network-layer protocols
C. testing the different network-layer protocols
D. provides for multiplexing of different network-layer protocols
Answer» B. establishing and configuring different network-layer protocols
28.

PPP consists of ________components

A. three (encapsulating, the domain name system)
B. three (encapsulating, a link control protocol, ncp)
C. two (a link control protocol, simple network control protocol)
D. one (simple network control protocol)
Answer» C. two (a link control protocol, simple network control protocol)
29.

PPP provides the _______ layer in the TCP/IP suite.

A. link
B. network
C. transport
D. application
Answer» B. network
30.

At which two traffic layers do most commercial IDSes generate signatures?

A. application layer and network layer
B. network layer and session layer
C. transport layer and application layer
D. transport layer and network layer
Answer» E.
31.

What is the purpose of a shadow honeypot?

A. to flag attacks against known vulnerabilities
B. to help reduce false positives in a signature-based ids
C. to randomly check suspicious traffic identified by an anomaly detection system
D. to enhance the accuracy of a traditional honeypot
Answer» D. to enhance the accuracy of a traditional honeypot
32.

RPC is a _________

A. synchronous operation
B. asynchronous operation
C. time independent operation
D. channel specific operation
Answer» B. asynchronous operation
33.

A remote procedure is uniquely identified by _________

A. program number
B. version number
C. procedure number
D. all of the mentioned
Answer» E.
34.

RPC works between two processes. These processes must be ____________

A. on the same computer
B. on different computers connected with a network
C. on the same computer and also on different computers connected with a network
D. on none of the computers
Answer» D. on none of the computers
35.

RPC allows a computer program to cause a subroutine to execute in _________

A. its own address space
B. another address space
C. both its own address space and another address space
D. applications address space
Answer» C. both its own address space and another address space
36.

An RPC application requires _________

A. specific protocol for client server communication
B. a client program
C. a server program
D. all of the mentioned
Answer» E.
37.

A remote procedure call is _______

A. inter-process communication
B. a single process
C. a single thread
D. a single stream
Answer» B. a single process
38.

In RPC, while a server is processing the call, the client is blocked ________

A. unless the client sends an asynchronous request to the server
B. unless the call processing is complete
C. for the complete duration of the connection
D. unless the server is disconnected
Answer» B. unless the call processing is complete
39.

An RPC (remote procedure call) is initiated by the _________

A. server
B. client
C. client after the sever
D. a third party
Answer» C. client after the sever
40.

An RTP header has a minimum size of _________

A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» B. 16 bytes
41.

Which one of the following multimedia formats can not be supported by RTP?

A. mpeg-4
B. mjpeg
C. mpeg
D. txt
Answer» E.
42.

RTP can use __________

A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» E.
43.

An RTP session is established for ____________

A. each media stream
B. all media streams
C. some predefined number of media streams
D. no media stream
Answer» B. all media streams
44.

RTP provides the facility of jitter ____________

A. media stream
B. expansion
C. media modification
D. security
Answer» B. expansion
45.

RTP is used to ________

A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. secure the stream
Answer» B. monitor transmission statistics of streams
46.

Real-time transport protocol (RTP) is mostly used in _________

A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» E.
47.

A unidirectional path switching ring is a network with __________

A. one ring
B. two rings
C. three rings
D. four rings
Answer» C. three rings
48.

Automatic protection switching in linear network is defined at the _______

A. line layer
B. section layer
C. photonic layer
D. path layer
Answer» B. section layer
49.

A linear SONET network can be ________

A. point-to-point
B. multi-point
C. both point-to-point and multi-point
D. single point
Answer» D. single point
50.

In SONET, each synchronous transfer signal STS-n is composed of __________

A. 2000 frames
B. 4000 frames
C. 8000 frames
D. 16000 frames
Answer» D. 16000 frames