303
112.4k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

701.

Which one of the following multimedia formats can not be supported by RTP?

A. mpeg-4
B. mjpeg
C. mpeg
D. txt
Answer» D. txt
702.

An RTP header has a minimum size of _________

A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» A. 12 bytes
703.

Which one of the following is not correct?

A. rtcp provides canonical end-point identifiers to all session participants
B. rtcp reports are expected to be sent by all participants
C. rtcp itself does not provide any flow encryption or authentication methods
D. rtcp handles the actual data delivery
Answer» D. rtcp handles the actual data delivery
704.

An RPC (remote procedure call) is initiated by the _________

A. server
B. client
C. client after the sever
D. a third party
Answer» B. client
705.

In RPC, while a server is processing the call, the client is blocked ________

A. unless the client sends an asynchronous request to the server
B. unless the call processing is complete
C. for the complete duration of the connection
D. unless the server is disconnected
Answer» A. unless the client sends an asynchronous request to the server
706.

A remote procedure call is _______

A. inter-process communication
B. a single process
C. a single thread
D. a single stream
Answer» A. inter-process communication
707.

RPC allows a computer program to cause a subroutine to execute in _________

A. its own address space
B. another address space
C. both its own address space and another address space
D. applications address space
Answer» B. another address space
708.

RPC works between two processes. These processes must be ____________

A. on the same computer
B. on different computers connected with a network
C. on the same computer and also on different computers connected with a network
D. on none of the computers
Answer» C. on the same computer and also on different computers connected with a network
709.

A remote procedure is uniquely identified by _________

A. program number
B. version number
C. procedure number
D. all of the mentioned
Answer» D. all of the mentioned
710.

An RPC application requires _________

A. specific protocol for client server communication
B. a client program
C. a server program
D. all of the mentioned
Answer» D. all of the mentioned
711.

RPC is a _________

A. synchronous operation
B. asynchronous operation
C. time independent operation
D. channel specific operation
Answer» A. synchronous operation
712.

Which of the following is an advantage of anomaly detection?

A. rules are easy to define
B. custom protocols can be easily analyzed
C. the engine can scale as the rule set grows
D. malicious activity that falls within normal usage patterns is detected
Answer» C. the engine can scale as the rule set grows
713.

What is the purpose of a shadow honeypot?

A. to flag attacks against known vulnerabilities
B. to help reduce false positives in a signature-based ids
C. to randomly check suspicious traffic identified by an anomaly detection system
D. to enhance the accuracy of a traditional honeypot
Answer» C. to randomly check suspicious traffic identified by an anomaly detection system
714.

At which two traffic layers do most commercial IDSes generate signatures?

A. application layer and network layer
B. network layer and session layer
C. transport layer and application layer
D. transport layer and network layer
Answer» D. transport layer and network layer
715.

When discussing IDS/IPS, what is a signature?

A. an electronic signature used to authenticate the identity of a user on the network
B. attack-definition file
C. it refers to “normal,” baseline network behavior
D. it is used to authorize the users on a network
Answer» B. attack-definition file
716.

Which of the following is true of signature-based IDSes?

A. they alert administrators to deviations from “normal” traffic behavior
B. they identify previously unknown attacks
C. the technology is mature and reliable enough to use on production networks
D. they scan network traffic or packets to identify matches with attack-definition files
Answer» D. they scan network traffic or packets to identify matches with attack-definition files
717.

PPP provides the _______ layer in the TCP/IP suite.

A. link
B. network
C. transport
D. application
Answer» A. link
718.

PPP consists of ________components

A. three (encapsulating, the domain name system)
B. three (encapsulating, a link control protocol, ncp)
C. two (a link control protocol, simple network control protocol)
D. one (simple network control protocol)
Answer» B. three (encapsulating, a link control protocol, ncp)
719.

A Link Control Protocol (LCP) is used for ____________

A. establishing, configuring and testing the data-link connection
B. establishing and configuring different network-layer protocols
C. testing the different network-layer protocols
D. provides for multiplexing of different network-layer protocols
Answer» A. establishing, configuring and testing the data-link connection
720.

A family of network control protocols (NCPs) ____________

A. are a series of independently defined protocols that provide a dynamic
B. are a series of independently-defined protocols that encapsulate
C. are a series of independently defined protocols that provide transparent
D. the same as nfs
Answer» B. are a series of independently-defined protocols that encapsulate
721.

Choose the correct statement from the following.

A. ppp can terminate the link at any time
B. ppp can terminate the link only during the link establishment phase
C. ppp can terminate the link during the authentication phase
D. ppp can terminate the link during the callback control phase
Answer» A. ppp can terminate the link at any time
722.

EIGRP metric is ________

A. k-values
B. bandwidth only
C. hop count
D. delay only
Answer» A. k-values
723.

EIGRP can support ____________

A. vlsm/subnetting
B. auto summary
C. unequal cast load balancing
D. all of the mentioned
Answer» D. all of the mentioned
724.

EIGRP sends a hello message after every ___________ seconds.

A. 5 seconds (lan), 60 seconds (wan)
B. 5 seconds (lan), 5 seconds (wan)
C. 15s
D. 180s
Answer» A. 5 seconds (lan), 60 seconds (wan)
725.

Administrative distance for internal EIGRP is ______

A. 90
B. 170
C. 110
D. 91
Answer» A. 90
726.

The EIGRP metric values include:

A. delay
B. bandwidth
C. mtu
D. all of the mentioned
Answer» D. all of the mentioned
727.

For default gateway, which of following commands will you use on a Cisco router?

A. ip default network
B. ip default gateway
C. ip default route
D. default network
Answer» A. ip default network
728.

Administrative distance for external EIGRP route is _______

A. 90
B. 170
C. 110
D. 100
Answer» B. 170
729.

EIGRP uses the ____________ algorithm for finding shortest path.

A. spf
B. dual
C. linkstat
D. djikstra’s
Answer» B. dual
730.

What are the other types of OLAP apart from ROLAP?

A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
Answer» B. MOLAP
731.

A network router joins two together?

A. Computers
B. Switches
C. Networks
D. Gateway
Answer» C. Networks
732.

Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues.

A. True
B. False
C. none
D. other
Answer» A. True
733.

Which of the following below is a loopback IPaddress?

A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Answer» D. 127.0.0.1
734.

Ping command works on which protocol?

A. ICMP
B. TCP
C. IP
D. UDP
Answer» A. ICMP
735.

Transport layer of OSI model lies between Network and layer

A. Application
B. Data link
C. Session
D. Presentation
Answer» C. Session
736.

Which of the following protocols below work in the application layer?

A. POP
B. PPP
C. FTP
D. Both a and d above
Answer» D. Both a and d above
737.

What is the port number for HTTP?

A. 25
B. 80
C. 21
D. 65
Answer» B. 80
738.

IP4 is more commonly used than IPv6?

A. True
B. False
C. none
D. other
Answer» A. True
739.

From the options below, which suits best for MODEM?

A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analoginformation
Answer» A. a device that modulates an analog carrier signal to encode digital information
740.

What is the size of an IP address?

A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
Answer» D. 32 bit
741.

MAC addresses are also known as?

A. Hardware address
B. Physical address
C. both and b above
D. IP address
Answer» C. both and b above
742.

A network point that provides entrance into another network is called as

A. Node
B. Gateway
C. Switch
D. Router
Answer» B. Gateway
743.

UDP is an unreliable protocol.

A. True
B. False
C. none
D. other
Answer» A. True
744.

A stream socket provides communications between a client and a server

A. One way
B. Two way
C. none
D. other
Answer» B. Two way
745.

Token Ring is a data link technology for?

A. WAN
B. MAN
C. LAN
D. both a and b above
Answer» C. LAN
746.

Which of the following protocol below are suited for email retrieval?

A. POP3
B. IMAP
C. FTP
D. Both and b above
Answer» D. Both and b above
747.

TELNET used protocol for data connection

A. TCP
B. UDP
C. IP
D. DHCP
Answer» A. TCP
748.

10Base5, 10Base2, 10BaseT are types of?

A. Internet
B. LAN
C. Ethernet
D. Cables
Answer» C. Ethernet
749.

The process of assigning the IP address for specific times to the various hosts by DHCP is called?

A. Lend
B. sublease
C. let
D. Lease
Answer» D. Lease
750.

What is the full form of URL?

A. Uniform routing locator
B. Uniform Resource Locator
C. Universal Resource Locator
D. Uniform router locator
Answer» B. Uniform Resource Locator

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.