

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
751. |
is a standard suite of protocols used for packet switching across computer networks. |
A. | x.22 |
B. | x.23 |
C. | x.25 |
D. | x.26 |
Answer» C. x.25 |
752. |
What is the full form of CAN? |
A. | Campus Area Network |
B. | Cluster Area Network |
C. | Control Area network |
D. | both A and B |
Answer» D. both A and B |
753. |
Which of the following below is/are the capability of ICMP protocol? |
A. | Report package count |
B. | Report network congestion |
C. | Both band d |
D. | Report availability of remote hosts |
Answer» C. Both band d |
754. |
ARP works on Ethernet networks. |
A. | False |
B. | True |
C. | none |
D. | other |
Answer» B. True |
755. |
assigns a unique number to each IP network adapter called the MAC address. |
A. | Media Access Control |
B. | Metro Access Control |
C. | Metropolitan Access Control |
D. | Both B and C above |
Answer» A. Media Access Control |
756. |
Piconets in the blue tooth a minimum of two and amaximum of Bluetooth peer devices. |
A. | five |
B. | eight |
C. | nine |
D. | four |
Answer» B. eight |
757. |
Dynamic addressing doesn’t allow many devices To share limited address space on a network |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» B. False |
758. |
NAT stands for . |
A. | network address transformer |
B. | network address translator |
C. | network address translation |
D. | Both B and C above |
Answer» C. network address translation |
759. |
Which of the following is true for secure shell tunneling? |
A. | To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
B. | SSH tunnels provide a means to not bypassfirewalls |
C. | All SSH clients support dynamic port forwarding |
D. | Both A and B |
Answer» A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
760. |
Which of the following below are secure VPN protocols? |
A. | UDP |
B. | TCP |
C. | SSTP |
D. | Both B and C |
Answer» D. Both B and C |
761. |
What is the difference between a switch and a hub? |
A. | Switches operate at the physical layer while hubs operate at the data link layer |
B. | Switches operate at the data link layer while hubs operate at the transport layer |
C. | Switches operate at the data link layer while hubs operate at the physical layer |
D. | Switches operate at the transport layer while hubs operate at the physical layer |
Answer» C. Switches operate at the data link layer while hubs operate at the physical layer |
762. |
When computers in a network listen and receive the signal, it is termed as active toplogy |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
763. |
In 10base2, 10base5, what do 2 and 5 stand for? |
A. | Speed in Mbps |
B. | Number of segments |
C. | Length of segment |
D. | Size of segment |
Answer» B. Number of segments |
764. |
is added to data packet for error detection. |
A. | checksum bit |
B. | error bit |
C. | parity bit |
D. | other |
Answer» C. parity bit |
765. |
ALL IP addresses are divided into a network address and host address |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
766. |
How can we examine the current routing tables in command prompt? |
A. | using route start |
B. | using net start |
C. | using net stat |
D. | either a or b |
Answer» C. using net stat |
767. |
Both ping and tracert are used to find If the computer is in the network. |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» B. False |
768. |
What is the difference between ring and bustopology? |
A. | In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
B. | In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable |
C. | In the bus, all nodes are connected with another in a loop while instar they are connected to a centralbnode |
D. | In Bus all nodes are connected with another loop while instar they are connected to a central cable |
Answer» A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
769. |
MAC addressing works in data link layer while IP addressing works in the network layer. |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
770. |
A packet whose destination is outside the local TCP/IP network segment is sentto the _. |
A. | File server |
B. | Default gateway |
C. | DNS server |
D. | DHCP server |
Answer» B. Default gateway |
771. |
Why was the OSI model developed? |
A. | manufacturers disliked the TCP/IP protocol suite |
B. | the rate of data transfer was increasing exponentially |
C. | standards were needed to allow any two systems to communicate |
D. | none of the above |
Answer» C. standards were needed to allow any two systems to communicate |
772. |
Which piece of information is not vital for a computer in a TCP/IP network? |
A. | IP address |
B. | Default gateway |
C. | Subnet Mask |
D. | DNS server |
Answer» D. DNS server |
773. |
The physical layer is concerned with the movement of over the physical medium. |
A. | programs |
B. | dialogs |
C. | protocols |
D. | Bits |
Answer» D. Bits |
774. |
Which protocol below operates at the network layer in the OSI model? |
A. | IP |
B. | ICMP |
C. | RARP |
D. | All of the above |
Answer» D. All of the above |
775. |
In the OSI model, as a data packet moves from the lower to the upper layers, headers are . |
A. | added |
B. | removed |
C. | rearranged |
D. | Modified |
Answer» B. removed |
776. |
Session layer of the OSI model provides |
A. | Data representation |
B. | Dialog control |
C. | Remote job execution |
D. | Creating logical connections |
Answer» B. Dialog control |
777. |
IPv6 has -bit addresses. |
A. | 32 |
B. | 64 |
C. | 128 |
D. | Variable |
Answer» C. 128 |
778. |
Which one of the following functionalities aren’t provided by TCP? |
A. | Flow control |
B. | Addressing |
C. | Retransmission of packets as required |
D. | Proper sequencing of the packets |
Answer» B. Addressing |
779. |
Which of the following can be an Ethernet physical address? |
A. | 01:02:01:2C:4B |
B. | 07:01:02:01:2C:4B:2C |
C. | 07:01:02:01:2C:4B |
D. | none of the above |
Answer» C. 07:01:02:01:2C:4B |
780. |
An IP address contains bits ? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» C. 32 |
781. |
Which routing protocol below is used by exterior routers between the autonomoussystems? |
A. | RIP |
B. | IGRP |
C. | OSPF |
D. | BGP |
Answer» D. BGP |
782. |
Which of the IP headers decides when the packet should be discarded? |
A. | Fragment control |
B. | TTL |
C. | Checksum |
D. | Header length |
Answer» B. TTL |
783. |
Which IP address is reserved for software loop-back? |
A. | 224.x.x.x |
B. | 127.x.x.x |
C. | 0.0.0.0 |
D. | 255.255.255.255 |
Answer» B. 127.x.x.x |
784. |
What is the network ID for a computer whose IP address is190.148.64.23? |
A. | 190 |
B. | 190.148 |
C. | 190.148.64 |
D. | None of the above |
Answer» B. 190.148 |
785. |
Which port is reserved for use of the SMTP protocol? |
A. | 21 |
B. | 23 |
C. | 25 |
D. | 53 |
Answer» C. 25 |
786. |
Which one of the followings is a connectionless protocol? |
A. | UDP |
B. | Ethernet |
C. | IPX |
D. | All of the above |
Answer» D. All of the above |
787. |
Which application below uses the UDP protocol? |
A. | DNS |
B. | TFTP |
C. | RIP |
D. | All of the above |
Answer» C. RIP |
788. |
How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? |
A. | 62 |
B. | 126 |
C. | 192 |
D. | 254 |
Answer» A. 62 |
789. |
Which of the followings is not a direct implication of subnet masks in TCP/IP networks? |
A. | Reduce network traffic |
B. | Increase network security |
C. | Assignment of more IP addresses |
D. | Better network management |
Answer» C. Assignment of more IP addresses |
790. |
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are |
A. | Added |
B. | Removed |
C. | Rearranged |
D. | Modified |
Answer» A. Added |
791. |
The structure or format of data is called |
A. | Syntax |
B. | Semantics |
C. | Struct |
D. | Formatting |
Answer» A. Syntax |
792. |
Communication between a computer and a keyboard involves transmission. |
A. | Automatic |
B. | Half-duplex |
C. | Full-duplex |
D. | Simplex |
Answer» D. Simplex |
793. |
The first Network was called |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» D. ARPANET |
794. |
A set of rules that governs data communication. |
A. | Protocols |
B. | Standards |
C. | RFCs |
D. | Servers |
Answer» A. Protocols |
795. |
Communication channel is shared by all the machines on the networkin |
A. | Broadcast network |
B. | Unicast network |
C. | Multicast network |
D. | Anycast network |
Answer» A. Broadcast network |
796. |
A is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | Bridge |
B. | Firewall |
C. | Router |
D. | Hub |
Answer» C. Router |
797. |
Network congestion occurs |
A. | In case of traffic overloading |
B. | When a system terminates |
C. | When connection between two nodes terminates |
D. | In case of transfer failure |
Answer» A. In case of traffic overloading |
798. |
Which of the following networks extends a private network across public networks? |
A. | Local area network |
B. | Virtual private network |
C. | Enterprise private network |
D. | Storage area network |
Answer» B. Virtual private network |
799. |
The number of layers in ISO OSI reference model is |
A. | 5 |
B. | 7 |
C. | 6 |
D. | 10 |
Answer» B. 7 |
800. |
Which of the following layers is an addition to OSI model when compared with TCP IPmodel? |
A. | Application layer |
B. | Presentation layer |
C. | Session layer |
D. | Session and Presentation layer |
Answer» D. Session and Presentation layer |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.