MCQOPTIONS
Saved Bookmarks
This section includes 301 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
In internetwork, the network layer at the destination is responsible for |
| A. | Address Authentication |
| B. | Address Node |
| C. | Address format |
| D. | Address Verification |
| Answer» E. | |
| 52. |
An option that is used by the source to predetermine a route for the datagram as it travels through the Internet is known as |
| A. | Strict Source |
| B. | Strict Source Header |
| C. | Strict Source Route |
| D. | Strict Source Data |
| Answer» D. Strict Source Data | |
| 53. |
IPv6 has the large address |
| A. | Protocol |
| B. | Link |
| C. | Space |
| D. | Stations |
| Answer» D. Stations | |
| 54. |
An agent contributes to the management process by warning the manager of an |
| A. | unusual situation |
| B. | unusual station |
| C. | unusual database |
| D. | unusual Protocol |
| Answer» B. unusual station | |
| 55. |
The first 3 codes in IPv4 Addresses, the telephone networks defines the |
| A. | IP code |
| B. | Local Code |
| C. | Area Code |
| D. | Block Code |
| Answer» D. Block Code | |
| 56. |
Network Address Translation (NAT) is used mostly by |
| A. | DSLs |
| B. | ADSL |
| C. | ISPs |
| D. | IPs |
| Answer» D. IPs | |
| 57. |
Multicast addresses in Ipv6 starts with |
| A. | 1111 |
| B. | 11110000 |
| C. | 11111111 |
| D. | 0 |
| Answer» D. 0 | |
| 58. |
IPv6 is designed to allow the extension of the |
| A. | Protocol |
| B. | DataSet |
| C. | Headers |
| D. | Routes |
| Answer» B. DataSet | |
| 59. |
The value 0000001 of the prefix of the IPv6 address shows the type of |
| A. | Multicast address |
| B. | Unicast address |
| C. | Reserved |
| D. | ISO network addresses |
| Answer» E. | |
| 60. |
When the IPv4 protocol sends a datagram, it copies the current value of the counter to the identification field and increments the counter by |
| A. | 1 |
| B. | 0 |
| C. | -1 |
| D. | 2 |
| Answer» B. 0 | |
| 61. |
In IPv6 addresses, the addresses start with eight 0s are called |
| A. | Unicast addresses |
| B. | Multicast addresses |
| C. | Anycast addresses |
| D. | Reserved addresses |
| Answer» E. | |
| 62. |
An application-level protocol in which a few manager stations control a set of agents, known as |
| A. | HTML |
| B. | TCP |
| C. | SNMP |
| D. | SNMP/IP |
| Answer» D. SNMP/IP | |
| 63. |
The responsibility of Physical and data link layers on the network is |
| A. | Data Delivery |
| B. | Data Flow |
| C. | Data Sync |
| D. | All of the above |
| Answer» B. Data Flow | |
| 64. |
The network layer at the source is responsible for creating a packet from the data coming from another |
| A. | Station |
| B. | Link |
| C. | Node |
| D. | Protocol |
| Answer» E. | |
| 65. |
An IPv4 address is a |
| A. | 8 bit address |
| B. | 16 bit address |
| C. | 32bit address |
| D. | 48 bit address |
| Answer» D. 48 bit address | |
| 66. |
In classfull addressing, several networks are combined to create a |
| A. | Classnet |
| B. | Internet |
| C. | Subnet |
| D. | Supernet |
| Answer» E. | |
| 67. |
In IPv4, the code point subfield can be used in |
| A. | 2 different ways |
| B. | 2 samilar Stations |
| C. | 2 similar activities |
| D. | Same format |
| Answer» B. 2 samilar Stations | |
| 68. |
The class of the IP addresses 208.34.54.12 will be |
| A. | Class A |
| B. | Class B |
| C. | Class C |
| D. | Class E |
| Answer» D. Class E | |
| 69. |
In IPv6, the base header has the |
| A. | 10 Fields |
| B. | 09 Fields |
| C. | 08 Fields |
| D. | 07 Fields |
| Answer» D. 07 Fields | |
| 70. |
All the outgoing packets go through NAT router, which replaces the source address in the packet with |
| A. | Destination address |
| B. | Global NAT address |
| C. | Local NAT address |
| D. | Absolute NAT address |
| Answer» C. Local NAT address | |
| 71. |
In Type Identifier of Unicast address, the 3 bit-field defines the address as |
| A. | Provider-base.d address. |
| B. | Provider-base.a address. |
| C. | Provider-base.h address. |
| D. | Provider-base.e address. |
| Answer» B. Provider-base.a address. | |
| 72. |
Which of the following technique is used for Time-To-Live (TTL)? |
| A. | one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size. |
| B. | a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. |
| C. | a technique used in best-effort delivery system to avoid endlessly looping packets. |
| D. | all of the above |
| Answer» D. all of the above | |
| 73. |
In fragmentation of IPv4, the 13-bit field that shows the relative position of the fragment with respect to the whole datagram is called |
| A. | Identification field |
| B. | flag field |
| C. | Fragmentation offset field |
| D. | None of the given |
| Answer» D. None of the given | |
| 74. |
In IPv4 Addresses, the reserved addresses of the Internet are unique |
| A. | Globally |
| B. | Locally |
| C. | Regionally |
| D. | None of the Above |
| Answer» C. Regionally | |
| 75. |
In classful addressing, the length of netid and hostid is predetermined, we can use it as |
| A. | IP Code |
| B. | Mask |
| C. | Unicode |
| D. | Numeric Id code |
| Answer» C. Unicode | |
| 76. |
In Congestion Controlled Traffic, it is understood that packets may arrive |
| A. | On Time |
| B. | Before time |
| C. | Delayed |
| D. | Both a and b |
| Answer» D. Both a and b | |
| 77. |
Using the form of abbreviation in IPv6 address, 3210 can be written as |
| A. | 321 |
| B. | Cannot be abbreviated |
| C. | 32 |
| D. | 3021 |
| Answer» C. 32 | |
| 78. |
A system is responsible for detecting, isolating, correcting and recording faults in |
| A. | Reactive Fault Management |
| B. | Stored Fault Management |
| C. | Report Fault Management |
| D. | Reserved Fault Management |
| Answer» B. Stored Fault Management | |
| 79. |
In the subcategories of reserved address in the IPv6, the address that is used by a host to test itself without going into the network is called |
| A. | Unspecified address |
| B. | Loopback address |
| C. | Compatible address |
| D. | Mapped address |
| Answer» C. Compatible address | |
| 80. |
In IPv6 Addresses, the leading zeros of a section can be omitted in the |
| A. | Hexadecimal colon notation |
| B. | Binary notation |
| C. | Dotted decimal IPv6 notation |
| D. | Abbreviated IPv6 addresses |
| Answer» E. | |
| 81. |
An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP and |
| A. | TCP |
| B. | CDM protocols |
| C. | ATM protocols |
| D. | IEEE protocols |
| Answer» B. CDM protocols | |
| 82. |
In the old time, a user was connected to the Internet with a |
| A. | ISP |
| B. | ADSL |
| C. | DSL |
| D. | dial up line |
| Answer» E. | |
| 83. |
Structure of Management Information (SMI), is the guideline of |
| A. | HTTP |
| B. | SNMP |
| C. | URL |
| D. | MIB |
| Answer» C. URL | |
| 84. |
The private network in the NAT is transparent to the rest of the |
| A. | Stations |
| B. | Blocks |
| C. | Internet |
| D. | All of the above |
| Answer» D. All of the above | |
| 85. |
To enhance reliability, IPv4 must be paired with a reliable protocol such as |
| A. | TCP/IP |
| B. | UDP |
| C. | TCP |
| D. | IEEE protocols |
| Answer» D. IEEE protocols | |
| 86. |
In the multicast address of the IPv6, a transient group address, is used |
| A. | Permanently |
| B. | Globally |
| C. | Temporarily |
| D. | Locally |
| Answer» D. Locally | |
| 87. |
The Internet has chosen the datagram approach to switching in the |
| A. | Data Link Layer |
| B. | Network Layer |
| C. | Physical Layer |
| D. | Presentation Layer |
| Answer» C. Physical Layer | |
| 88. |
The IP packet that carries an IGMP packet has a value of _______ in its protocol field. |
| A. | 3 |
| B. | 2 |
| C. | 1 |
| D. | none of the above |
| Answer» C. 1 | |
| 89. |
In IPv4 Addresses, organizational networks are connected to the Internet via a |
| A. | Mask |
| B. | Router |
| C. | Bridge |
| D. | BUS |
| Answer» C. Bridge | |
| 90. |
Three strategies used to handle the transition from version 4 to version 6 are dual stack, tunneling and |
| A. | Header Switching |
| B. | Header Translation |
| C. | Header transfer |
| D. | Header Transmission |
| Answer» C. Header transfer | |
| 91. |
In Network Management System, Fault management is closely related to |
| A. | Performance Management |
| B. | Security Management |
| C. | Active Management |
| D. | Reserved Management |
| Answer» B. Security Management | |
| 92. |
The server program running on the agent can check the |
| A. | Information |
| B. | Environment |
| C. | Database |
| D. | SNMP Protocol |
| Answer» C. Database | |
| 93. |
When HEADER LENGTH field of the IPv4 header is at its maximum size, the value of the field willl be |
| A. | 5 |
| B. | 15 |
| C. | 20 |
| D. | 60 |
| Answer» C. 20 | |
| 94. |
The IPv4 addressing is also called the classful addressing because it uses the concept of |
| A. | Classes |
| B. | Segments |
| C. | Chips |
| D. | Both b and c |
| Answer» B. Segments | |
| 95. |
In internetwork, the frames does not carry any |
| A. | Flow |
| B. | Error |
| C. | Links |
| D. | Information |
| Answer» E. | |
| 96. |
When two computers using IPv6 want to communicate with each other, the strategy is used known as |
| A. | Tunneling |
| B. | Drilling |
| C. | Packaging |
| D. | Curving |
| Answer» B. Drilling | |
| 97. |
A few leftmost bits in each address of the IPv6 address define its category,is known as |
| A. | Prefix type |
| B. | Postfix type |
| C. | Reserved type |
| D. | Local type |
| Answer» B. Postfix type | |
| 98. |
The Encrypted Security Payload (ESP) is an extension that provides |
| A. | Stability |
| B. | Availibilty |
| C. | Reliability |
| D. | Confidentiality |
| Answer» E. | |
| 99. |
An IPv6 address is |
| A. | 8 bits long |
| B. | 16 bits long |
| C. | 32 bits long |
| D. | 128 bits long. |
| Answer» E. | |
| 100. |
In IPv6 Addresses, the 5-bit field in the prefixes for provider-based unicast address indicates the agency that has registered the address is |
| A. | Type identifier |
| B. | Registry identifier |
| C. | Provider identifier |
| D. | Subscriber Identifier |
| Answer» C. Provider identifier | |