242
97.6k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

551.

Which of the following are Gigabit Ethernets?

A. 1000 base-sx
B. 1000 base-lx
C. 1000 base-cx
D. all of the mentioned
Answer» D. all of the mentioned
552.

_________ is another kind of fiber optic network with an active star for switching.

A. s/net
B. sw/net
C. net/sw
D. fs/net
Answer» A. s/net
553.

What is the subnet id of a host with an IP address 172.16.66.0/21?

A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer» C. 172.16.64.0
554.

The network address of 172.16.0.0/19 provides how many subnets and hosts?

A. 7 subnets, 30 hosts each
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
Answer» B. 8 subnets, 8,190 hosts each
555.

Which type of Ethernet framing is used for TCP/IP and DEC net?

A. ethernet 802.3
B. ethernet 802.2
C. ethernet ii
D. ethernet snap
Answer» C. ethernet ii
556.

Which NetWare protocol works on layer 3–network layer—of the OSI model?

A. ipx
B. ncp
C. spx
D. netbios
Answer» A. ipx
557.

Which NetWare protocol provides link-state routing?

A. nlsp
B. rip
C. sap
D. ncp
Answer» A. nlsp
558.

0.0.0 router IGRP 109 network 172.68.7.0

A. it isolates networks 10.0.0.0 and 172.68.7.0
B. it loads igrp for networks 109 and 71
C. it disables rip
D. it disables all routing protocols
Answer» A. it isolates networks 10.0.0.0 and 172.68.7.0
559.

What does the “IPX maximum-paths 2” command accomplish?

A. it enables load sharing on 2 paths if the paths are equal metric paths
B. it sets up routing to go to network 2
C. it is the default for cisco ipx load sharing
D. it enables load sharing on 2 paths if the paths are unequal metric paths
Answer» A. it enables load sharing on 2 paths if the paths are equal metric paths
560.

Novell’s implementation of RIP updates routing tables every _________ seconds.

A. 60
B. 90
C. 10
D. 30
Answer» A. 60
561.

Which protocol should you select if the network diameter is more than 17 hops?

A. ripv1
B. ripv2
C. eigrp
D. both ripv1 and ripv2
Answer» A. ripv1
562.

How often does a RIPv1 router broadcast its routing table by default?

A. every 30 seconds
B. every 60 seconds
C. every 90 seconds
D. ripv1 does not broadcast periodically
Answer» A. every 30 seconds
563.

Which command displays RIP routing updates?

A. show ip route
B. debug ip rip
C. show protocols
D. debug ip route
Answer» B. debug ip rip
564.

Default administrative distance of a static route is ________

A. 0
B. 90
C. 100
D. 1
Answer» D. 1
565.

Which protocol gives a full route table update every 30 seconds?

A. iegrp
B. rip
C. icmp
D. ip
Answer» B. rip
566.

_________ is the default administrative distance of RIP.

A. 0
B. 90
C. 120
D. 130
Answer» C. 120
567.

Which statement is true regarding classless routing protocol?

A. the use of discontinuous networks is not allowed
B. use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. igrp supports classes routing within the same autonomous system
Answer» B. use of variable length subnet masks is permitted
568.

Where should we use default routing?

A. on stub networks- which have only one exit path out of the network
B. which have more than one exit path out of the network
C. minimum five exit paths out of the network
D. maximum five exit paths out of the network
Answer» A. on stub networks- which have only one exit path out of the network
569.

Which statement is true regarding classless routing protocols?

A. the use of discontinuous networks is not allowed
B. the use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. ripv2 supports classless routing
Answer» B. the use of variable length subnet masks is permitted
570.

Which of the following is true regarding RIPv2?

A. it has a lower administrative distance than ripv1
B. it converges faster than ripv1
C. it has the same timers as ripv1
D. it is harder to configure than ripv1
Answer» C. it has the same timers as ripv1
571.

Which of the situations might not require multiple routing protocols in a network?

A. when a new layer 2-only switch is added to the network
B. when you are migrating from one routing protocol to another
C. when you are using routers from multiple vendors
D. when there are host-based routers from multiple vendors
Answer» A. when a new layer 2-only switch is added to the network
572.

Which two routing protocols can be redistributed into OSPF by a Cisco router?

A. ip eigrp and appletalk eigrp
B. appletalk eigrp and ripv2
C. ripv2 and ip eigrp
D. ipx rip & appletalk eigrp
Answer» C. ripv2 and ip eigrp
573.

What does administrative distance rank?

A. metrics
B. sources of routing information
C. router reliability
D. best paths
Answer» B. sources of routing information
574.

Which protocol maintains neighbor adjacencies?

A. ripv2 and eigrp
B. igrp and eigrp
C. ripv2
D. eigrp
Answer» C. ripv2
575.

Which routing protocol implements the diffusing update algorithm?

A. is-is
B. igrp
C. eigrp
D. ospf
Answer» C. eigrp
576.

Which protocol should you select if the network diameter is more than 17 hops?

A. ripv1
B. ripv2
C. eigrp
D. ospf
Answer» B. ripv2
577.

In the network HTTP resources are located by __________

A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» A. uniform resource identifier
578.

FTP server listens for connection on which port number?

A. 20
B. 21
C. 22
D. 23
Answer» B. 21
579.

In FTP protocol, a client contacts a server using ______ as the transport protocol.

A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» A. transmission control protocol
580.

The File Transfer Protocol is built on __________

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» C. client server architecture
581.

In File Transfer Protocol, data transfer cannot be done in __________

A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» D. message mode
582.

Which methods are commonly used in Server Socket class?

A. public output stream get output stream ()
B. public socket accept ()
C. public synchronized void close ()
D. public void connect ()
Answer» B. public socket accept ()
583.

The client in socket programming must know which information?

A. ip address of server
B. port number
C. both ip address of server & port number
D. only its own ip address
Answer» C. both ip address of server & port number
584.

TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________

A. socket
B. ip address
C. protocol
D. mac address
Answer» C. protocol
585.

What does the java.net.InetAddress class represent?

A. socket
B. ip address
C. protocol
D. mac address
Answer» B. ip address
586.

Which classes are used for connection-less socket programming?

A. datagram socket
B. datagram packet
C. both datagram socket & datagram packet
D. server socket
Answer» C. both datagram socket & datagram packet
587.

In Inet Address class, which method returns the host name of the IP Address?

A. public string get hostname()
B. public string gethostaddress()
C. public static inetaddress get localhost()
D. public getbyname()
Answer» A. public string get hostname()
588.

Cookies were originally designed for ____________

A. client side programming
B. server side programming
C. both client side programming and server side programming
D. socket programming
Answer» B. server side programming
589.

The Cookie manipulation is done using which property?

A. cookie
B. cookies
C. manipulate
D. manipulate cookie
Answer» A. cookie
590.

Which of the following explains Cookies nature?

A. non volatile
B. volatile
C. intransient
D. transient
Answer» D. transient
591.

Which attribute is used to extend the lifetime of a cookie?

A. higher-age
B. increase-age
C. max-age
D. lifetime
Answer» C. max-age
592.

Which of the following defines the Cookie visibility?

A. document path
B. localstorage
C. sessionstorage
D. all of the mentioned
Answer» D. all of the mentioned
593.

Which of the following can be used to configure the scope of the Cookie visibility?

A. path
B. domain
C. both path and domain
D. server
Answer» D. server
594.

How can you set a Cookie visibility scope to local Storage?

A. /
B. %
C. *
D. #
Answer» A. /
595.

Which of the following is a Boolean cookie attribute?

A. bool
B. secure
C. lookup
D. domain
Answer» B. secure
596.

What is the constraint on the data per cookie?

A. 2 kb
B. 1 kb
C. 4 kb
D. 3 kb
Answer» C. 4 kb
597.

What does REST stand for?

A. represent state transfer
B. representational state transfer
C. representing state transfer
D. representation state transfer
Answer» B. representational state transfer
598.

Which of the following HTTP methods should be idempotent in nature?

A. options
B. delete
C. post
D. head
Answer» B. delete
599.

Next-Hop Method is used to reduce contents of a _________

A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Answer» C. routing table
600.

In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________

A. graph
B. tree
C. network
D. link
Answer» A. graph

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.