

MCQOPTIONS
Saved Bookmarks
This section includes 301 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.
51. |
In internetwork, the network layer at the destination is responsible for |
A. | Address Authentication |
B. | Address Node |
C. | Address format |
D. | Address Verification |
Answer» E. | |
52. |
An option that is used by the source to predetermine a route for the datagram as it travels through the Internet is known as |
A. | Strict Source |
B. | Strict Source Header |
C. | Strict Source Route |
D. | Strict Source Data |
Answer» D. Strict Source Data | |
53. |
IPv6 has the large address |
A. | Protocol |
B. | Link |
C. | Space |
D. | Stations |
Answer» D. Stations | |
54. |
An agent contributes to the management process by warning the manager of an |
A. | unusual situation |
B. | unusual station |
C. | unusual database |
D. | unusual Protocol |
Answer» B. unusual station | |
55. |
The first 3 codes in IPv4 Addresses, the telephone networks defines the |
A. | IP code |
B. | Local Code |
C. | Area Code |
D. | Block Code |
Answer» D. Block Code | |
56. |
Network Address Translation (NAT) is used mostly by |
A. | DSLs |
B. | ADSL |
C. | ISPs |
D. | IPs |
Answer» D. IPs | |
57. |
Multicast addresses in Ipv6 starts with |
A. | 1111 |
B. | 11110000 |
C. | 11111111 |
D. | 0 |
Answer» D. 0 | |
58. |
IPv6 is designed to allow the extension of the |
A. | Protocol |
B. | DataSet |
C. | Headers |
D. | Routes |
Answer» B. DataSet | |
59. |
The value 0000001 of the prefix of the IPv6 address shows the type of |
A. | Multicast address |
B. | Unicast address |
C. | Reserved |
D. | ISO network addresses |
Answer» E. | |
60. |
When the IPv4 protocol sends a datagram, it copies the current value of the counter to the identification field and increments the counter by |
A. | 1 |
B. | 0 |
C. | -1 |
D. | 2 |
Answer» B. 0 | |
61. |
In IPv6 addresses, the addresses start with eight 0s are called |
A. | Unicast addresses |
B. | Multicast addresses |
C. | Anycast addresses |
D. | Reserved addresses |
Answer» E. | |
62. |
An application-level protocol in which a few manager stations control a set of agents, known as |
A. | HTML |
B. | TCP |
C. | SNMP |
D. | SNMP/IP |
Answer» D. SNMP/IP | |
63. |
The responsibility of Physical and data link layers on the network is |
A. | Data Delivery |
B. | Data Flow |
C. | Data Sync |
D. | All of the above |
Answer» B. Data Flow | |
64. |
The network layer at the source is responsible for creating a packet from the data coming from another |
A. | Station |
B. | Link |
C. | Node |
D. | Protocol |
Answer» E. | |
65. |
An IPv4 address is a |
A. | 8 bit address |
B. | 16 bit address |
C. | 32bit address |
D. | 48 bit address |
Answer» D. 48 bit address | |
66. |
In classfull addressing, several networks are combined to create a |
A. | Classnet |
B. | Internet |
C. | Subnet |
D. | Supernet |
Answer» E. | |
67. |
In IPv4, the code point subfield can be used in |
A. | 2 different ways |
B. | 2 samilar Stations |
C. | 2 similar activities |
D. | Same format |
Answer» B. 2 samilar Stations | |
68. |
The class of the IP addresses 208.34.54.12 will be |
A. | Class A |
B. | Class B |
C. | Class C |
D. | Class E |
Answer» D. Class E | |
69. |
In IPv6, the base header has the |
A. | 10 Fields |
B. | 09 Fields |
C. | 08 Fields |
D. | 07 Fields |
Answer» D. 07 Fields | |
70. |
All the outgoing packets go through NAT router, which replaces the source address in the packet with |
A. | Destination address |
B. | Global NAT address |
C. | Local NAT address |
D. | Absolute NAT address |
Answer» C. Local NAT address | |
71. |
In Type Identifier of Unicast address, the 3 bit-field defines the address as |
A. | Provider-base.d address. |
B. | Provider-base.a address. |
C. | Provider-base.h address. |
D. | Provider-base.e address. |
Answer» B. Provider-base.a address. | |
72. |
Which of the following technique is used for Time-To-Live (TTL)? |
A. | one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size. |
B. | a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. |
C. | a technique used in best-effort delivery system to avoid endlessly looping packets. |
D. | all of the above |
Answer» D. all of the above | |
73. |
In fragmentation of IPv4, the 13-bit field that shows the relative position of the fragment with respect to the whole datagram is called |
A. | Identification field |
B. | flag field |
C. | Fragmentation offset field |
D. | None of the given |
Answer» D. None of the given | |
74. |
In IPv4 Addresses, the reserved addresses of the Internet are unique |
A. | Globally |
B. | Locally |
C. | Regionally |
D. | None of the Above |
Answer» C. Regionally | |
75. |
In classful addressing, the length of netid and hostid is predetermined, we can use it as |
A. | IP Code |
B. | Mask |
C. | Unicode |
D. | Numeric Id code |
Answer» C. Unicode | |
76. |
In Congestion Controlled Traffic, it is understood that packets may arrive |
A. | On Time |
B. | Before time |
C. | Delayed |
D. | Both a and b |
Answer» D. Both a and b | |
77. |
Using the form of abbreviation in IPv6 address, 3210 can be written as |
A. | 321 |
B. | Cannot be abbreviated |
C. | 32 |
D. | 3021 |
Answer» C. 32 | |
78. |
A system is responsible for detecting, isolating, correcting and recording faults in |
A. | Reactive Fault Management |
B. | Stored Fault Management |
C. | Report Fault Management |
D. | Reserved Fault Management |
Answer» B. Stored Fault Management | |
79. |
In the subcategories of reserved address in the IPv6, the address that is used by a host to test itself without going into the network is called |
A. | Unspecified address |
B. | Loopback address |
C. | Compatible address |
D. | Mapped address |
Answer» C. Compatible address | |
80. |
In IPv6 Addresses, the leading zeros of a section can be omitted in the |
A. | Hexadecimal colon notation |
B. | Binary notation |
C. | Dotted decimal IPv6 notation |
D. | Abbreviated IPv6 addresses |
Answer» E. | |
81. |
An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP and |
A. | TCP |
B. | CDM protocols |
C. | ATM protocols |
D. | IEEE protocols |
Answer» B. CDM protocols | |
82. |
In the old time, a user was connected to the Internet with a |
A. | ISP |
B. | ADSL |
C. | DSL |
D. | dial up line |
Answer» E. | |
83. |
Structure of Management Information (SMI), is the guideline of |
A. | HTTP |
B. | SNMP |
C. | URL |
D. | MIB |
Answer» C. URL | |
84. |
The private network in the NAT is transparent to the rest of the |
A. | Stations |
B. | Blocks |
C. | Internet |
D. | All of the above |
Answer» D. All of the above | |
85. |
To enhance reliability, IPv4 must be paired with a reliable protocol such as |
A. | TCP/IP |
B. | UDP |
C. | TCP |
D. | IEEE protocols |
Answer» D. IEEE protocols | |
86. |
In the multicast address of the IPv6, a transient group address, is used |
A. | Permanently |
B. | Globally |
C. | Temporarily |
D. | Locally |
Answer» D. Locally | |
87. |
The Internet has chosen the datagram approach to switching in the |
A. | Data Link Layer |
B. | Network Layer |
C. | Physical Layer |
D. | Presentation Layer |
Answer» C. Physical Layer | |
88. |
The IP packet that carries an IGMP packet has a value of _______ in its protocol field. |
A. | 3 |
B. | 2 |
C. | 1 |
D. | none of the above |
Answer» C. 1 | |
89. |
In IPv4 Addresses, organizational networks are connected to the Internet via a |
A. | Mask |
B. | Router |
C. | Bridge |
D. | BUS |
Answer» C. Bridge | |
90. |
Three strategies used to handle the transition from version 4 to version 6 are dual stack, tunneling and |
A. | Header Switching |
B. | Header Translation |
C. | Header transfer |
D. | Header Transmission |
Answer» C. Header transfer | |
91. |
In Network Management System, Fault management is closely related to |
A. | Performance Management |
B. | Security Management |
C. | Active Management |
D. | Reserved Management |
Answer» B. Security Management | |
92. |
The server program running on the agent can check the |
A. | Information |
B. | Environment |
C. | Database |
D. | SNMP Protocol |
Answer» C. Database | |
93. |
When HEADER LENGTH field of the IPv4 header is at its maximum size, the value of the field willl be |
A. | 5 |
B. | 15 |
C. | 20 |
D. | 60 |
Answer» C. 20 | |
94. |
The IPv4 addressing is also called the classful addressing because it uses the concept of |
A. | Classes |
B. | Segments |
C. | Chips |
D. | Both b and c |
Answer» B. Segments | |
95. |
In internetwork, the frames does not carry any |
A. | Flow |
B. | Error |
C. | Links |
D. | Information |
Answer» E. | |
96. |
When two computers using IPv6 want to communicate with each other, the strategy is used known as |
A. | Tunneling |
B. | Drilling |
C. | Packaging |
D. | Curving |
Answer» B. Drilling | |
97. |
A few leftmost bits in each address of the IPv6 address define its category,is known as |
A. | Prefix type |
B. | Postfix type |
C. | Reserved type |
D. | Local type |
Answer» B. Postfix type | |
98. |
The Encrypted Security Payload (ESP) is an extension that provides |
A. | Stability |
B. | Availibilty |
C. | Reliability |
D. | Confidentiality |
Answer» E. | |
99. |
An IPv6 address is |
A. | 8 bits long |
B. | 16 bits long |
C. | 32 bits long |
D. | 128 bits long. |
Answer» E. | |
100. |
In IPv6 Addresses, the 5-bit field in the prefixes for provider-based unicast address indicates the agency that has registered the address is |
A. | Type identifier |
B. | Registry identifier |
C. | Provider identifier |
D. | Subscriber Identifier |
Answer» C. Provider identifier | |