

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
601. |
RPF stands for __________ |
A. | reverse path forwarding |
B. | reverse path failure |
C. | reverse packet forwarding |
D. | reverse protocol failure |
Answer» A. reverse path forwarding |
602. |
LSP stands for __________ |
A. | link stable packet |
B. | link state packet |
C. | link state protocol |
D. | link state path |
Answer» B. link state packet |
603. |
Network layer firewall works as a ________ |
A. | frame filter |
B. | packet filter |
C. | signal filter |
D. | content filter |
Answer» B. packet filter |
604. |
Network layer firewall has two sub-categories called ____________ |
A. | stateful firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network firewall and data firewall |
Answer» A. stateful firewall and stateless firewall |
605. |
WPA2 is used for security in _______ |
A. | ethernet |
B. | bluetooth |
C. | wi-fi |
D. | |
Answer» C. wi-fi |
606. |
Open Shortest Path First (OSPF) is also called as _____________ |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | border gateway protocol |
Answer» A. link state protocol |
607. |
The computation of the shortest path in OSPF is usually done by ____________ |
A. | bellman-ford algorithm |
B. | routing information protocol |
C. | dijkstra’s algorithm |
D. | distance vector routing |
Answer» C. dijkstra’s algorithm |
608. |
In OSPF, which protocol is used to discover neighbour routers automatically? |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | hello protocol |
Answer» D. hello protocol |
609. |
Which of the following is not a type of OSPF packet? |
A. | hello |
B. | link-state request |
C. | link-state response |
D. | link-state ack |
Answer» C. link-state response | |
Explanation: The five types of OSPF packets are: Hello, Database description, Linkstate request, Link-state update, and Link-state ACK. There is no Link-state response packet; the neighbor router sends a Link-state update packet as a response to the Linkstate request packet if there is an update in the routing table. |
610. |
In OSPF header, which field is used to detect errors in the packet? |
A. | type |
B. | area id |
C. | authentication type |
D. | checksum |
Answer» D. checksum | |
Explanation: The checksum field is used to detect errors. It makes sure that the data portions that are being sent are all in integrity. It can detect duplicated bits. Once an error is detected, the sender has to re-transmit the data as it won’t receive an acknowledgment. |
611. |
The outcome of Dijkstra’s calculation is used to populate the __________ |
A. | topology table |
B. | routing table |
C. | neighbor table |
D. | adjacency table |
Answer» B. routing table |
612. |
What is the IP protocol number for OSPF packets? |
A. | 89 |
B. | 86 |
C. | 20 |
D. | 76 |
Answer» A. 89 |
613. |
Which packet is NOT an OSPF packet type? |
A. | lsu |
B. | lsr |
C. | dbd |
D. | query |
Answer» D. query |
614. |
Which multicast address does the OSPF Hello protocol use? |
A. | 224.0.0.5 |
B. | 224.0.0.6 |
C. | 224.0.0.7 |
D. | 224.0.0.8 |
Answer» A. 224.0.0.5 |
615. |
DBD packets are involved during which two states? |
A. | exstart and exchange |
B. | loading and two-way |
C. | init and full |
D. | down and loading |
Answer» A. exstart and exchange |
616. |
At which interval does OSPF refresh LSAs? |
A. | 10 seconds |
B. | 30 seconds |
C. | 30 minutes |
D. | 1 hour |
Answer» D. 1 hour |
617. |
Which field is NOT a field within an OSPF packet header? |
A. | packet length |
B. | router id |
C. | authentication type |
D. | maxage time |
Answer» D. maxage time |
618. |
Which two commands are required for basic OSPF configuration? |
A. | “[network mask] area [area-id]” and “router ospf [process-id]” |
B. | “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]” |
C. | only “router ospf [process-id]” |
D. | “[wildcard-mask] area [area-id]” and “router ospf [process-id]” |
Answer» D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]” |
619. |
Which OSPF show command describes a list of OSPF adjacencies? |
A. | show ip ospf interface |
B. | show ip ospf |
C. | show ip route |
D. | show ip ospf neighbor |
Answer» D. show ip ospf neighbor |
620. |
Datagram switching is done at which layer of OSI model? |
A. | network layer |
B. | physical layer |
C. | application layer |
D. | transport layer |
Answer» A. network layer |
621. |
Packets in datagram switching are referred to as ________ |
A. | switches |
B. | segments |
C. | datagrams |
D. | data-packets |
Answer» C. datagrams |
622. |
Datagrams are routed to their destinations with the help of ________ |
A. | switch table |
B. | segments table |
C. | datagram table |
D. | routing table |
Answer» C. datagram table |
623. |
The main contents of the routing table in datagram networks are ___________ |
A. | source and destination address |
B. | destination address and output port |
C. | source address and output port |
D. | input port and output port |
Answer» B. destination address and output port |
624. |
Which of the following is true with respect to the delay in datagram networks? |
A. | delay is greater than in a virtual circuit network |
B. | each packet may experience a wait at a switch |
C. | delay is not uniform for the packets of a message |
D. | all of the mentioned |
Answer» D. all of the mentioned |
625. |
Which of the following is false with respect to the datagram networks? |
A. | number of flows of packets are not limited |
B. | packets may not be in order at the destination |
C. | path is not reserved |
D. | delay is the same for all packets in a flow |
Answer» D. delay is the same for all packets in a flow |
626. |
Network layer firewall works as a __________ |
A. | frame filter |
B. | packet filter |
C. | content filter |
D. | virus filter |
Answer» B. packet filter |
627. |
Network layer firewall has two sub-categories as _________ |
A. | state full firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network layer firewall and session layer firewall |
Answer» A. state full firewall and stateless firewall |
628. |
Which of the following is / are the types of firewall? |
A. | packet filtering firewall |
B. | dual homed gateway firewall |
C. | screen host firewall |
D. | dual host firewall |
Answer» A. packet filtering firewall |
629. |
A proxy firewall filters at _________ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» D. application layer |
630. |
A packet filter firewall filters at __________ |
A. | physical layer |
B. | data link layer |
C. | network layer or transport layer |
D. | application layer |
Answer» C. network layer or transport layer |
631. |
What is one advantage of setting up a DMZ with two firewalls? |
A. | you can control where traffic goes in three networks |
B. | you can do stateful packet filtering |
C. | you can do load balancing |
D. | improved network performance |
Answer» C. you can do load balancing |
632. |
A stateful firewall maintains a ___________ which is a list of active connections. |
A. | routing table |
B. | bridging table |
C. | state table |
D. | connection table |
Answer» A. routing table |
633. |
Performance management is closely related to _________ |
A. | proactive fault management |
B. | fault management |
C. | reactive fault management |
D. | preventive fault management |
Answer» B. fault management |
634. |
Which of the following networks supports pipelining effect? |
A. | circuit-switched networks |
B. | message-switched networks |
C. | packet-switched networks |
D. | stream-switched networks |
Answer» C. packet-switched networks |
635. |
MIB is a collection of groups of objects that can be managed by __________ |
A. | smtp |
B. | udp |
C. | snmp |
D. | tcp/ip |
Answer» C. snmp |
636. |
A network management system can be divided into ___________ |
A. | three categories |
B. | five broad categories |
C. | seven broad categories |
D. | ten broad categories |
Answer» B. five broad categories |
637. |
Ping can _________ |
A. | measure round-trip time |
B. | report packet loss |
C. | report latency |
D. | all of the mentioned |
Answer» D. all of the mentioned |
638. |
Ping sweep is a part of _________ |
A. | traceroute |
B. | nmap |
C. | route |
D. | ipconfig |
Answer» B. nmap |
639. |
ICMP is used in _________ |
A. | ping |
B. | traceroute |
C. | ifconfig |
D. | both ping & traceroute |
Answer» D. both ping & traceroute |
640. |
__________ command is used to manipulate TCP/IP routing table. |
A. | route |
B. | ipconfig |
C. | ifconfig |
D. | traceroute |
Answer» A. route |
641. |
Which of the following is not related to ipconfig in Microsoft Windows? |
A. | display all current tcp/ip network configuration values |
B. | modify dhcp settings |
C. | modify dns settings |
D. | trace the routers in the path to destination |
Answer» D. trace the routers in the path to destination |
642. |
__________ allows checking if a domain is available for registration. |
A. | domain check |
B. | domain dossier |
C. | domain lookup |
D. | domain registers |
Answer» A. domain check |
643. |
Choose the wrong statement from the following. |
A. | nslookup is used to query a dns server for dns data |
B. | ping is used to check connectivity |
C. | pathping combines the functionality of ping with that of route |
D. | ifconfig can configure tcp/ip network interface parameters |
Answer» C. pathping combines the functionality of ping with that of route |
644. |
Ethernet frame consists of ____________ |
A. | mac address |
B. | ip address |
C. | default mask |
D. | network address |
Answer» A. mac address |
645. |
What is start frame delimeter (SFD) in ethernet frame? |
A. | 10101010 |
B. | 10101011 |
C. | 00000000 |
D. | 11111111 |
Answer» B. 10101011 |
646. |
MAC address is of ___________ |
A. | 24 bits |
B. | 36 bits |
C. | 42 bits |
D. | 48 bits |
Answer» D. 48 bits |
647. |
Ethernet in metropolitan area network (MAN) can be used as ___________ |
A. | pure ethernet |
B. | ethernet over sdh |
C. | ethernet over mpls |
D. | all of the mentioned |
Answer» D. all of the mentioned |
648. |
A point-to-point protocol over ethernet is a network protocol for __________ |
A. | encapsulating ppp frames inside ethernet frames |
B. | encapsulating ehternet framse inside ppp frames |
C. | for security of ethernet frames |
D. | for security of ppp frames |
Answer» A. encapsulating ppp frames inside ethernet frames |
649. |
High speed ethernet works on _________ |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | unshielded twisted pair cable |
Answer» C. optical fiber |
650. |
The maximum size of payload field in ethernet frame is __________ |
A. | 1000 bytes |
B. | 1200 bytes |
C. | 1300 bytes |
D. | 1500 bytes |
Answer» D. 1500 bytes |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.