

MCQOPTIONS
This section includes 43 Mcqs, each offering curated multiple-choice questions to sharpen your computer networking knowledge and support exam preparation. Choose a topic below to get started.
1. |
What does the command routerA(config)#line cons 0 allow you to perform next? |
A. | Set the Telnet password. |
B. | Shut down the router. |
C. | Set your console password. |
D. | Disable console connections. |
Answer» D. Disable console connections. | |
2. |
What does the passive command provide to dynamic routing protocols? |
A. | Stops an interface from sending or receiving periodic dynamic updates. |
B. | Stops an interface from sending periodic dynamic updates but not from receiving updates. |
C. | Stops the router from receiving any dynamic updates. |
D. | Stops the router from sending any dynamic updates. |
Answer» C. Stops the router from receiving any dynamic updates. | |
3. |
What are the two main types of access control lists (ACLs)? 1.Standard 2.IEEE 3.Extended 4.Specialized |
A. | 1 and 3 |
B. | 2 and 4 |
C. | 3 and 4 |
D. | 1 and 2 |
Answer» E. | |
4. |
When collection of various computers seems a single coherent system to its client, then it is called: |
A. | computer network |
B. | distributed system |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) | |
5. |
Which of the following networks extends a private network across public networks? |
A. | local area network |
B. | virtual private network |
C. | enterprise private network |
D. | storage area network |
Answer» C. enterprise private network | |
6. |
The IETF standards documents are called ________ |
A. | RFC |
B. | RCF |
C. | ID |
D. | DFC |
Answer» B. RCF | |
7. |
What protocols are used to configure trunking on a switch? 1.VLAN Trunking Protocol 2.VLAN 3.802.1Q 4.ISL |
A. | 1 and 2 |
B. | 3 and 4 |
C. | 1 only |
D. | 2 only |
Answer» B. 3 and 4 | |
8. |
Which command is used to upgrade an IOS on a Cisco router? |
A. | copy tftp run |
B. | copy tftp start |
C. | config net |
D. | copy tftp flash |
Answer» E. | |
9. |
When collection of various computers seems a single coherent system to its client, then it is called _________ |
A. | computer network |
B. | distributed system |
C. | networking system |
D. | mail system |
Answer» C. networking system | |
10. |
Three or more devices share a link in ________ connection. |
A. | Unipoint |
B. | Multipoint |
C. | Point to point |
D. | Simplex |
Answer» C. Point to point | |
11. |
A _________ set of rules that governs data communication. |
A. | Protocols |
B. | Standards |
C. | RFCs |
D. | Servers |
Answer» B. Standards | |
12. |
A _______ is the physical path over which a message travels. |
A. | Path |
B. | Medium |
C. | Protocol |
D. | Route |
Answer» C. Protocol | |
13. |
The first Network was called ________ |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» E. | |
14. |
The structure or format of data is called ___________ |
A. | Syntax |
B. | Semantics |
C. | Struct |
D. | Formatting |
Answer» B. Semantics | |
15. |
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________ |
A. | Added |
B. | Removed |
C. | Rearranged |
D. | Modified |
Answer» B. Removed | |
16. |
Network congestion occurs _________ |
A. | in case of traffic overloading |
B. | when a system terminates |
C. | when connection between two nodes terminates |
D. | in case of transfer failure |
Answer» B. when a system terminates | |
17. |
A list of protocols used by a system, one protocol per layer, is called ________ |
A. | protocol architecture |
B. | protocol stack |
C. | protocol suite |
D. | protocol system |
Answer» C. protocol suite | |
18. |
Bluetooth is an example of __________ |
A. | personal area network |
B. | local area network |
C. | virtual private network |
D. | wide area network |
Answer» B. local area network | |
19. |
A __________ is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | bridge |
B. | firewall |
C. | router |
D. | hub |
Answer» D. hub | |
20. |
Communication channel is shared by all the machines on the network in ________ |
A. | broadcast network |
B. | multicast network |
C. | unicast network |
D. | anycast network |
Answer» B. multicast network | |
21. |
In computer network nodes are _________ |
A. | the computer that originates the data |
B. | the computer that routes the data |
C. | the computer that terminates the data |
D. | all of the mentioned |
Answer» E. | |
22. |
Which of the following computer networks is built on the top of another network? |
A. | prior network |
B. | chief network |
C. | prime network |
D. | overlay network |
Answer» E. | |
23. |
Two devices are in network if __________ |
A. | a process in one device is able to exchange information with a process in another device |
B. | a process is running on both devices |
C. | PIDs of the processes running of different devices are same |
D. | a process is active and another is inactive |
Answer» B. a process is running on both devices | |
24. |
Which one of the following extends a private network across public networks? |
A. | local area network |
B. | virtual private network |
C. | enterprise private network |
D. | storage area network |
Answer» C. enterprise private network | |
25. |
Network congestion occurs: |
A. | in case of traffic overloading |
B. | when a system terminates |
C. | when connection between two nodes terminates |
D. | none of the mentioned |
Answer» B. when a system terminates | |
26. |
A list of protocols used by a system, one protocol per layer, is called: |
A. | protocol architecture |
B. | protocol stack |
C. | protocol suit |
D. | none of the mentioned |
Answer» C. protocol suit | |
27. |
A _____ is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | bridge |
B. | |
C. | C. |
D. | D. |
Answer» D. D. | |
28. |
Bluetooth is an example of: |
A. | personal area network |
B. | local area network |
C. | |
D. | D. |
Answer» B. local area network | |
29. |
Communication channel is shared by all the machines on the network in: |
A. | broadcast network |
B. | unicast network |
C. | multicast network |
D. | none of the mentioned |
Answer» B. unicast network | |
30. |
In computer network nodes are: |
A. | the computer that originates the data |
B. | the computer that routes the data |
C. | the computer that terminates the data |
D. | all of the mentioned |
Answer» E. | |
31. |
Two devices are in network if: |
A. | a process in one device is able to exchange information with a process in another device |
B. | a process is running on both devices |
C. | PIDs of the processes running of different devices are same |
D. | none of the mentioned |
Answer» B. a process is running on both devices | |
32. |
Which one of the following computer network is built on the top of another network? |
A. | prior network |
B. | chief network |
C. | prime network |
D. | overlay network |
Answer» E. | |
33. |
The IETF standards documents are called: |
A. | RFC |
B. | RCF |
C. | ID |
D. | None of the mentioned |
Answer» B. RCF | |
34. |
Which transmission media has the highest transmission speed in a network? |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | electrical cable |
Answer» D. electrical cable | |
35. |
Three or more devices share a link in ________ connection: |
A. | Unipoint |
B. | Multipoint |
C. | Point to point |
D. | None of the mentioned |
Answer» C. Point to point | |
36. |
Which organization has authority over interstate and international commerce in the communications field? |
A. | ITU-T |
B. | IEEE |
C. | |
D. | FCC |
E. | ISOC |
Answer» D. FCC | |
37. |
Which of this is not a network edge device? |
A. | PC |
B. | Smartphones |
C. | Servers |
D. | Switch |
Answer» E. | |
38. |
A set of rules that governs data communication: |
A. | Protocols |
B. | Standards |
C. | RFCs |
D. | None of the mentioned |
Answer» B. Standards | |
39. |
The first Network: |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» E. | |
40. |
The _______ is the physical path over which a message travels: |
A. | Ppath |
B. | Medium |
C. | Protocol |
D. | Route |
Answer» C. Protocol | |
41. |
Communication between a computer and a keyboard involves ______________ transmission. |
A. | Automatic |
B. | Half-duplex |
C. | Full-duplex |
D. | Simplex |
Answer» E. | |
42. |
The structure or format of data is called: |
A. | Syntax |
B. | Semantics |
C. | Struct |
D. | None of the mentioned |
Answer» B. Semantics | |
43. |
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are: |
A. | Added |
B. | Removed |
C. | Rearranged |
D. | Modified |
Answer» B. Removed | |