

MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
51. |
ATM can be used for ________ |
A. | local area network |
B. | wide area network |
C. | campus area network |
D. | networks covering any range |
Answer» E. | |
52. |
NAT stands for _____ . |
A. | network address transformer |
B. | network address translator |
C. | network address translation |
D. | Both B and C above |
Answer» D. Both B and C above | |
53. |
If we want that a character be interpreted by the client instead of server _________ |
A. | interpret as command (iac) escape character has to be used |
B. | control functions has to be disabled |
C. | it is not possible |
D. | cli character has to be used |
Answer» B. control functions has to be disabled | |
54. |
A is a TCP name for a transport service access point. |
A. | port |
B. | pipe |
C. | node |
D. | none of the mentioned |
Answer» B. pipe | |
55. |
If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» E. | |
56. |
ISP exchanges internet traffic between their networks by __________ |
A. | internet exchange point |
B. | subscriber end point |
C. | isp end point |
D. | internet end point |
Answer» B. subscriber end point | |
57. |
What will be the efficiency of a Stop and Wait protocol, if the transmissiontime for a frame is 20ns and the propagation time is 30ns? |
A. | 20% |
B. | 25% |
C. | 40% |
D. | 66% |
Answer» C. 40% | |
58. |
Which of the following are transport layer protocols used in networking? |
A. | tcp and ftp |
B. | udp and http |
C. | tcp and udp |
D. | http and ftp |
Answer» D. http and ftp | |
59. |
EIGRP sends a hello message after every ___________ seconds. |
A. | 5 seconds (lan), 60 seconds (wan) |
B. | 5 seconds (lan), 5 seconds (wan) |
C. | 15s |
D. | 180s |
Answer» B. 5 seconds (lan), 5 seconds (wan) | |
60. |
For default gateway, which of following commands will you use on a Cisco router? |
A. | ip default network |
B. | ip default gateway |
C. | ip default route |
D. | default network |
Answer» B. ip default gateway | |
61. |
User datagram protocol is called connectionless because _____________ |
A. | all udp packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | it is received in the same order as sent order |
D. | it sends data very quickly |
Answer» B. it sends data as a stream of related packets | |
62. |
Why IP Protocol is considered as unreliable? |
A. | A packet may be lost |
B. | Packets may arrive out of order |
C. | Duplicate packets may be generated |
D. | All of the above |
Answer» E. | |
63. |
Frame relay provides error detection at the ______ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | transport layer |
Answer» C. network layer | |
64. |
An RPC application requires _________ |
A. | specific protocol for client server communication |
B. | a client program |
C. | a server program |
D. | all of the mentioned |
Answer» E. | |
65. |
HFC contains _______ |
A. | fibre cable |
B. | coaxial cable |
C. | a combination of fibre cable and coaxial cable |
D. | twisted pair cable |
Answer» D. twisted pair cable | |
66. |
Retransmission of packets must not be done when _______ |
A. | packet is lost |
B. | packet is corrupted |
C. | packet is needed |
D. | packet is error-free |
Answer» E. | |
67. |
The time required to examine the packet’s header and determine where to direct the packetis part of |
A. | Processing delay |
B. | Queuing delay |
C. | Transmission delay |
D. | Propagation delay |
Answer» B. Queuing delay | |
68. |
If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is |
A. | 32kbps |
B. | 500bps |
C. | 500kbps |
D. | 32bps |
Answer» B. 500bps | |
69. |
An IP address contains________ bits ? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» D. 64 | |
70. |
For encryption, WiMAX supports _______ |
A. | advanced encryption standard |
B. | triple data encryption standard |
C. | advanced encryption standard and triple data encryption standard |
D. | double data encryption standard |
Answer» D. double data encryption standard | |
71. |
The 802.5 standard implements a way for preventing collisions on thenetwork. How are collisions prevented when using this standard? |
A. | CSMA/CD |
B. | Token passing |
C. | Collision detection |
D. | Time sharing |
Answer» C. Collision detection | |
72. |
Which of the following frequencies is not used in WiMAX for communication? |
A. | 2.3 ghz |
B. | 2.4 ghz |
C. | 2.5 ghz |
D. | 3.5 ghz |
Answer» C. 2.5 ghz | |
73. |
Propagation delay depends on ___________ |
A. | packet length |
B. | transmission rate |
C. | distance between the routers |
D. | speed of the cpu |
Answer» D. speed of the cpu | |
74. |
The combination of an IP address and port number is called as ________ |
A. | socket address |
B. | port address |
C. | mac address |
D. | host address |
Answer» B. port address | |
75. |
Which one of the followings is a connectionless protocol? |
A. | UDP |
B. | Ethernet |
C. | IPX |
D. | All of the above |
Answer» E. | |
76. |
A network management system can be divided into ___________ |
A. | three categories |
B. | five broad categories |
C. | seven broad categories |
D. | ten broad categories |
Answer» C. seven broad categories | |
77. |
The number of layers in ISO OSI reference model is |
A. | 5 |
B. | 7 |
C. | 6 |
D. | 10 |
Answer» C. 6 | |
78. |
DSL stands for ------------------------ |
A. | data subscriber lines |
B. | dual subscriber lines |
C. | delay subscriber lines |
D. | digital subscriber lines |
Answer» E. | |
79. |
SMTP connections secured by SSL are known as _____________ |
A. | smtps |
B. | ssmtp |
C. | snmp |
D. | starttls |
Answer» B. ssmtp | |
80. |
The main reason for transition from IPv4 to IPv6 is _________ |
A. | huge number of systems on the internet |
B. | very low number of system on the internet |
C. | providing standard address |
D. | to provide faster internet |
Answer» B. very low number of system on the internet | |
81. |
A single channel is shared by multiple signals by ____________ |
A. | analog modulation |
B. | digital modulation |
C. | multiplexing |
D. | phase modulation |
Answer» D. phase modulation | |
82. |
LSP stands for __________ |
A. | link stable packet |
B. | link state packet |
C. | link state protocol |
D. | link state path |
Answer» C. link state protocol | |
83. |
Which multiplexing technique used to transmit digital signals? |
A. | fdm |
B. | tdm |
C. | wdm |
D. | fdm & wdm |
Answer» C. wdm | |
84. |
Steps required in setup process are ___________ |
A. | setup request and acknowledgement |
B. | setup request and setup response |
C. | setup request and setup termination |
D. | setup and termination steps |
Answer» B. setup request and setup response | |
85. |
Which of the following device is used to connect two systems, especiallyifthe systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» D. repeater | |
86. |
RPF stands for __________ |
A. | reverse path forwarding |
B. | reverse path failure |
C. | reverse packet forwarding |
D. | reverse protocol failure |
Answer» B. reverse path failure | |
87. |
In computer network nodes are _________ |
A. | the computer that originates the data |
B. | the computer that routes the data |
C. | the computer that terminates the data |
D. | all of the mentioned |
Answer» E. | |
88. |
Ethernet frame consists of ____________ |
A. | mac address |
B. | ip address |
C. | default mask |
D. | network address |
Answer» B. ip address | |
89. |
What is the max data transfer rate for optical fiber cable? |
A. | 10 mbps |
B. | 100 mbps |
C. | 1000 mbps |
D. | 10000 mbps |
Answer» E. | |
90. |
The port number is “ephemeral port number”, if the source host is _______ |
A. | ntp |
B. | echo |
C. | server |
D. | client |
Answer» E. | |
91. |
In serial data transmission, every byte of data is padded with a ‘0’ in thebeginning and one or two ‘1’ s at the end of byte because |
A. | Receiver is to be synchronized for byte reception |
B. | Receiver recovers lost ‘0’ and ‘1’s from these padded bits |
C. | Padded bits are useful in parity computation |
D. | None of these |
Answer» B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits | |
92. |
Packets in datagram switching are referred to as ________ |
A. | switches |
B. | segments |
C. | datagrams |
D. | data-packets |
Answer» D. data-packets | |
93. |
Which of the following factors affect transmission rate in DSL? |
A. | the gauge of the twisted-pair line |
B. | degree of electrical interfernece |
C. | shadow fading |
D. | the gauge of the twisted-pair line and degree of electrical interference |
Answer» E. | |
94. |
A family of network control protocols (NCPs) ____________ |
A. | are a series of independently defined protocols that provide a dynamic |
B. | are a series of independently-defined protocols that encapsulate |
C. | are a series of independently defined protocols that provide transparent |
D. | the same as nfs |
Answer» C. are a series of independently defined protocols that provide transparent | |
95. |
What are the uses of subnetting ? |
A. | It divides one large network into several smaller ones |
B. | It divides network into network classes |
C. | It speeds up the speed of network |
D. | None of above |
Answer» B. It divides network into network classes | |
96. |
A network point that provides entrance into another network is called as ___________ |
A. | Node |
B. | Gateway |
C. | Switch |
D. | Router |
Answer» C. Switch | |
97. |
What is the size of Host bits in Class B of IP address? |
A. | 04 |
B. | 08 |
C. | 16 |
D. | 32 |
Answer» D. 32 | |
98. |
Which of the following protocol below are suited for email retrieval? |
A. | POP3 |
B. | IMAP |
C. | FTP |
D. | Both and b above |
Answer» E. | |
99. |
Which routing protocol below is used by exterior routers between the autonomous systems? |
A. | RIP |
B. | IGRP |
C. | OSPF |
D. | BGP |
Answer» E. | |
100. |
Transport layer of OSI model lies between Network and layer |
A. | Application |
B. | Data link |
C. | Session |
D. | Presentation |
Answer» D. Presentation | |