

MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
101. |
In the OSI model, as a data packet moves from the lower to the upper layers, headers are . |
A. | added |
B. | removed |
C. | rearranged |
D. | Modified |
Answer» C. rearranged | |
102. |
Which of the following modulation schemes is supported by WiMAX? |
A. | binary phase shift keying modulation |
B. | quadrature phase shift keying modulation |
C. | quadrature amplitude modulation |
D. | all of the mentioned |
Answer» E. | |
103. |
How many layers are present in the Internet protocol stack (TCP/IP model)? |
A. | 5 |
B. | 7 |
C. | 6 |
D. | 10 |
Answer» B. 7 | |
104. |
Where should we use default routing? |
A. | on stub networks- which have only one exit path out of the network |
B. | which have more than one exit path out of the network |
C. | minimum five exit paths out of the network |
D. | maximum five exit paths out of the network |
Answer» B. which have more than one exit path out of the network | |
105. |
A subset of a network that includes all the routers but contains no loops iscalled: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» B. spider structure | |
106. |
Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Serversystem using message queues. |
A. | True |
B. | False |
Answer» B. False | |
107. |
DSL telcos provide which of the following services? |
A. | wired phone access |
B. | isp |
C. | wired phone access and isp |
D. | network routing and isp |
Answer» D. network routing and isp | |
108. |
Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peerdevices. |
A. | five |
B. | eight |
C. | nine |
D. | four |
Answer» C. nine | |
109. |
In classful addressing, a large part of available addresses are ________ |
A. | organized |
B. | blocked |
C. | wasted |
D. | communicated |
Answer» D. communicated | |
110. |
The main difference between SNMPv3 and SNMPv2 is _______ |
A. | management |
B. | integration |
C. | classification |
D. | enhanced security |
Answer» E. | |
111. |
WiMAX provides ________ |
A. | simplex communication |
B. | half duplex communication |
C. | full duplex communication |
D. | no communication |
Answer» D. no communication | |
112. |
ATM uses _______________ |
A. | asynchronous frequency division multiplexing |
B. | asynchronous time division multiplexing |
C. | asynchronous space division multiplexing |
D. | asynchronous amplitude division multiplexing |
Answer» C. asynchronous space division multiplexing | |
113. |
The domain name system is maintained by _______ |
A. | distributed database system |
B. | a single server |
C. | a single computer |
D. | none of the mentioned |
Answer» B. a single server | |
114. |
Which of the following is an advantage of anomaly detection? |
A. | rules are easy to define |
B. | custom protocols can be easily analyzed |
C. | the engine can scale as the rule set grows |
D. | malicious activity that falls within normal usage patterns is detected |
Answer» D. malicious activity that falls within normal usage patterns is detected | |
115. |
WAN stands for __________ |
A. | world area network |
B. | wide area network |
C. | web area network |
D. | web access network |
Answer» C. web area network | |
116. |
Telnet protocol is used to establish a connection to __________ |
A. | tcp port number 21 |
B. | tcp port number 22 |
C. | tcp port number 23 |
D. | tcp port number 25 |
Answer» D. tcp port number 25 | |
117. |
A network router joins two _________ together? |
A. | Computers |
B. | Switches |
C. | Networks |
D. | Gateway |
Answer» D. Gateway | |
118. |
An RPC (remote procedure call) is initiated by the _________ |
A. | server |
B. | client |
C. | client after the sever |
D. | a third party |
Answer» C. client after the sever | |
119. |
A list of protocols used by a system, one protocol per layer, is called ________ |
A. | protocol architecture |
B. | protocol stack |
C. | protocol suite |
D. | protocol system |
Answer» C. protocol suite | |
120. |
To use a Simple Network Management System, we need _______ |
A. | servers |
B. | ip |
C. | protocols |
D. | rules |
Answer» E. | |
121. |
ICMP is primarily used for __________ |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | routing |
Answer» B. addressing | |
122. |
ICMP is primarily used for: |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | none of the mentioned |
Answer» B. addressing | |
123. |
Which Project 802 standard provides for a collision-free protocol? |
A. | 802.2 |
B. | 802.3 |
C. | 802.5 |
D. | 802.6 |
Answer» D. 802.6 | |
124. |
ALL IP addresses are divided into a network address and host address |
A. | True |
B. | False |
Answer» B. False | |
125. |
Firewalls are often configured to block ___________ |
A. | udp traffic |
B. | tcp traffic |
C. | sensitive traffic |
D. | best-effort traffic |
Answer» B. tcp traffic | |
126. |
ESP does not provide ________ |
A. | source authentication |
B. | data integrity |
C. | privacy |
D. | error control |
Answer» E. | |
127. |
The function of DSLAM is to __________ |
A. | convert analog signals into digital signals |
B. | convert digital signals into analog signals |
C. | amplify digital signals |
D. | de-amplify digital signals |
Answer» B. convert digital signals into analog signals | |
128. |
What allows TCP to detect lost segments and in turn recover from that loss? |
A. | sequence number |
B. | acknowledgment number |
C. | checksum |
D. | both sequence & acknowledgment number |
Answer» C. checksum | |
129. |
Which of the following below is a loopback IP address? |
A. | 127.0.0.0 |
B. | 127.0.1.1 |
C. | 127.0.1.0 |
D. | 127.0.0.1 |
Answer» E. | |
130. |
Range of port numbers in Internet model is __________ |
A. | 0 and 32,765(8-bit) |
B. | 0 and 32,765(16-bit) |
C. | 0 and 65,535(32-bit) |
D. | 0 and 65,535(16-bit) |
Answer» E. | |
131. |
Application layer is implemented in ____________ |
A. | end system |
B. | nic |
C. | ethernet |
D. | packet transport |
Answer» B. nic | |
132. |
A session may include ________ |
A. | zero or more smtp transactions |
B. | exactly one smtp transactions |
C. | always more than one smtp transactions |
D. | number of smtp transactions cant be determined |
Answer» B. exactly one smtp transactions | |
133. |
is the multiplexing technique that shifts each signal to a different carrierfrequency. |
A. | FDM |
B. | TDM |
C. | Both FDM & TDM |
D. | PDM |
Answer» B. TDM | |
134. |
Which of the following below are secure VPN protocols? |
A. | UDP |
B. | TCP |
C. | SSTP |
D. | Both B and C |
Answer» E. | |
135. |
SYNC flooding attack belongs to a type of security attack known as ___________ |
A. | sync flooding attack |
B. | active attack |
C. | passive attack |
D. | denial-of-service attack |
Answer» E. | |
136. |
Return value of the UDP port “Chargen” is _______ |
A. | string of characters |
B. | string of integers |
C. | array of characters with integers |
D. | array of zero’s and one’s |
Answer» B. string of integers | |
137. |
Which IP address is reserved for software loop-back? |
A. | 224.x.x.x |
B. | 127.x.x.x |
C. | 0.0.0.0 |
D. | 255.255.255.255 |
Answer» C. 0.0.0.0 | |
138. |
The functionalities of the presentation layerinclude |
A. | Data compression |
B. | Data encryption |
C. | Data description |
D. | All of the mentioned |
Answer» E. | |
139. |
An endpoint of an inter-process communication flow across a computer network is called: |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» B. pipe | |
140. |
Which of these is a feature of hubs? |
A. | Hubs amplifies the incoming signal. |
B. | Hubs understand frames, packets or headers |
C. | All lines coming into a Hub must operate at a same speed. |
D. | all of these |
Answer» D. all of these | |
141. |
What are the other types of OLAP apart from ROLAP? |
A. | HOLAP |
B. | MOLAP |
C. | DOLAP |
D. | Both a and b above |
Answer» C. DOLAP | |
142. |
Ping command works on which protocol? |
A. | ICMP |
B. | TCP |
C. | IP |
D. | UDP |
Answer» B. TCP | |
143. |
MAC addresses are also known as? |
A. | Hardware address |
B. | Physical address |
C. | both and b above |
D. | IP address |
Answer» D. IP address | |
144. |
Dual-stack approach refers to _________ |
A. | implementing ipv4 with 2 stacks |
B. | implementing ipv6 with 2 stacks |
C. | node has both ipv4 and ipv6 support |
D. | implementing a mac address with 2 stacks |
Answer» D. implementing a mac address with 2 stacks | |
145. |
Which of the following statements can be associated with OSI model? |
A. | a structured way to discuss and easier update system components |
B. | one layer may duplicate lower layer functionality |
C. | functionality at one layer no way requires information from another layer |
D. | it is an application specific network model |
Answer» D. it is an application specific network model | |
146. |
Delimiting and synchronization of data exchange is providedby |
A. | Application layer |
B. | Session layer |
C. | Transport layer |
D. | Link layer |
Answer» C. Transport layer | |
147. |
Communication channel is shared by all the machines on the networkin |
A. | Broadcast network |
B. | Unicast network |
C. | Multicast network |
D. | Anycast network |
Answer» B. Unicast network | |
148. |
Delimiting and synchronization of data exchange is provided by __________ |
A. | application layer |
B. | session layer |
C. | transport layer |
D. | link layer |
Answer» C. transport layer | |
149. |
MIB is a collection of groups of objects that can be managed by __________ |
A. | smtp |
B. | udp |
C. | snmp |
D. | tcp/ip |
Answer» D. tcp/ip | |
150. |
Which connector does the STP cable use? |
A. | bnc |
B. | rj-11 |
C. | rj-45 |
D. | rj-69 |
Answer» D. rj-69 | |