Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

In the OSI model, as a data packet moves from the lower to the upper layers, headers are .

A. added
B. removed
C. rearranged
D. Modified
Answer» C. rearranged
2.

Which of the following modulation schemes is supported by WiMAX?

A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Answer» E.
3.

How many layers are present in the Internet protocol stack (TCP/IP model)?

A. 5
B. 7
C. 6
D. 10
Answer» B. 7
4.

Where should we use default routing?

A. on stub networks- which have only one exit path out of the network
B. which have more than one exit path out of the network
C. minimum five exit paths out of the network
D. maximum five exit paths out of the network
Answer» B. which have more than one exit path out of the network
5.

A subset of a network that includes all the routers but contains no loops iscalled:

A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» B. spider structure
6.

Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Serversystem using message queues.

A. True
B. False
Answer» B. False
7.

DSL telcos provide which of the following services?

A. wired phone access
B. isp
C. wired phone access and isp
D. network routing and isp
Answer» D. network routing and isp
8.

Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peerdevices.

A. five
B. eight
C. nine
D. four
Answer» C. nine
9.

In classful addressing, a large part of available addresses are ________

A. organized
B. blocked
C. wasted
D. communicated
Answer» D. communicated
10.

The main difference between SNMPv3 and SNMPv2 is _______

A. management
B. integration
C. classification
D. enhanced security
Answer» E.
11.

WiMAX provides ________

A. simplex communication
B. half duplex communication
C. full duplex communication
D. no communication
Answer» D. no communication
12.

ATM uses _______________

A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Answer» C. asynchronous space division multiplexing
13.

The domain name system is maintained by _______

A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» B. a single server
14.

Which of the following is an advantage of anomaly detection?

A. rules are easy to define
B. custom protocols can be easily analyzed
C. the engine can scale as the rule set grows
D. malicious activity that falls within normal usage patterns is detected
Answer» D. malicious activity that falls within normal usage patterns is detected
15.

WAN stands for __________

A. world area network
B. wide area network
C. web area network
D. web access network
Answer» C. web area network
16.

Telnet protocol is used to establish a connection to __________

A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 25
Answer» D. tcp port number 25
17.

A network router joins two _________ together?

A. Computers
B. Switches
C. Networks
D. Gateway
Answer» D. Gateway
18.

An RPC (remote procedure call) is initiated by the _________

A. server
B. client
C. client after the sever
D. a third party
Answer» C. client after the sever
19.

A list of protocols used by a system, one protocol per layer, is called ________

A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» C. protocol suite
20.

To use a Simple Network Management System, we need _______

A. servers
B. ip
C. protocols
D. rules
Answer» E.
21.

ICMP is primarily used for __________

A. error and diagnostic functions
B. addressing
C. forwarding
D. routing
Answer» B. addressing
22.

ICMP is primarily used for:

A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
Answer» B. addressing
23.

Which Project 802 standard provides for a collision-free protocol?

A. 802.2
B. 802.3
C. 802.5
D. 802.6
Answer» D. 802.6
24.

ALL IP addresses are divided into a network address and host address

A. True
B. False
Answer» B. False
25.

Firewalls are often configured to block ___________

A. udp traffic
B. tcp traffic
C. sensitive traffic
D. best-effort traffic
Answer» B. tcp traffic
26.

ESP does not provide ________

A. source authentication
B. data integrity
C. privacy
D. error control
Answer» E.
27.

The function of DSLAM is to __________

A. convert analog signals into digital signals
B. convert digital signals into analog signals
C. amplify digital signals
D. de-amplify digital signals
Answer» B. convert digital signals into analog signals
28.

What allows TCP to detect lost segments and in turn recover from that loss?

A. sequence number
B. acknowledgment number
C. checksum
D. both sequence & acknowledgment number
Answer» C. checksum
29.

Which of the following below is a loopback IP address?

A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Answer» E.
30.

Range of port numbers in Internet model is __________

A. 0 and 32,765(8-bit)
B. 0 and 32,765(16-bit)
C. 0 and 65,535(32-bit)
D. 0 and 65,535(16-bit)
Answer» E.
31.

Application layer is implemented in ____________

A. end system
B. nic
C. ethernet
D. packet transport
Answer» B. nic
32.

A session may include ________

A. zero or more smtp transactions
B. exactly one smtp transactions
C. always more than one smtp transactions
D. number of smtp transactions cant be determined
Answer» B. exactly one smtp transactions
33.

is the multiplexing technique that shifts each signal to a different carrierfrequency.

A. FDM
B. TDM
C. Both FDM & TDM
D. PDM
Answer» B. TDM
34.

Which of the following below are secure VPN protocols?

A. UDP
B. TCP
C. SSTP
D. Both B and C
Answer» E.
35.

SYNC flooding attack belongs to a type of security attack known as ___________

A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Answer» E.
36.

Return value of the UDP port “Chargen” is _______

A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Answer» B. string of integers
37.

Which IP address is reserved for software loop-back?

A. 224.x.x.x
B. 127.x.x.x
C. 0.0.0.0
D. 255.255.255.255
Answer» C. 0.0.0.0
38.

The functionalities of the presentation layerinclude

A. Data compression
B. Data encryption
C. Data description
D. All of the mentioned
Answer» E.
39.

An endpoint of an inter-process communication flow across a computer network is called:

A. socket
B. pipe
C. port
D. none of the mentioned
Answer» B. pipe
40.

Which of these is a feature of hubs?

A. Hubs amplifies the incoming signal.
B. Hubs understand frames, packets or headers
C. All lines coming into a Hub must operate at a same speed.
D. all of these
Answer» D. all of these
41.

What are the other types of OLAP apart from ROLAP?

A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
Answer» C. DOLAP
42.

Ping command works on which protocol?

A. ICMP
B. TCP
C. IP
D. UDP
Answer» B. TCP
43.

MAC addresses are also known as?

A. Hardware address
B. Physical address
C. both and b above
D. IP address
Answer» D. IP address
44.

Dual-stack approach refers to _________

A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. implementing a mac address with 2 stacks
Answer» D. implementing a mac address with 2 stacks
45.

Which of the following statements can be associated with OSI model?

A. a structured way to discuss and easier update system components
B. one layer may duplicate lower layer functionality
C. functionality at one layer no way requires information from another layer
D. it is an application specific network model
Answer» D. it is an application specific network model
46.

Delimiting and synchronization of data exchange is providedby

A. Application layer
B. Session layer
C. Transport layer
D. Link layer
Answer» C. Transport layer
47.

Communication channel is shared by all the machines on the networkin

A. Broadcast network
B. Unicast network
C. Multicast network
D. Anycast network
Answer» B. Unicast network
48.

Delimiting and synchronization of data exchange is provided by __________

A. application layer
B. session layer
C. transport layer
D. link layer
Answer» C. transport layer
49.

MIB is a collection of groups of objects that can be managed by __________

A. smtp
B. udp
C. snmp
D. tcp/ip
Answer» D. tcp/ip
50.

Which connector does the STP cable use?

A. bnc
B. rj-11
C. rj-45
D. rj-69
Answer» D. rj-69