McqMate
601. |
RPF stands for __________ |
A. | reverse path forwarding |
B. | reverse path failure |
C. | reverse packet forwarding |
D. | reverse protocol failure |
Answer» A. reverse path forwarding |
602. |
LSP stands for __________ |
A. | link stable packet |
B. | link state packet |
C. | link state protocol |
D. | link state path |
Answer» B. link state packet |
603. |
Network layer firewall works as a ________ |
A. | frame filter |
B. | packet filter |
C. | signal filter |
D. | content filter |
Answer» B. packet filter |
604. |
Network layer firewall has two sub-categories called ____________ |
A. | stateful firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network firewall and data firewall |
Answer» A. stateful firewall and stateless firewall |
605. |
WPA2 is used for security in _______ |
A. | ethernet |
B. | bluetooth |
C. | wi-fi |
D. | |
Answer» C. wi-fi |
606. |
Open Shortest Path First (OSPF) is also called as _____________ |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | border gateway protocol |
Answer» A. link state protocol |
607. |
The computation of the shortest path in OSPF is usually done by ____________ |
A. | bellman-ford algorithm |
B. | routing information protocol |
C. | dijkstra’s algorithm |
D. | distance vector routing |
Answer» C. dijkstra’s algorithm |
608. |
In OSPF, which protocol is used to discover neighbour routers automatically? |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | hello protocol |
Answer» D. hello protocol |
609. |
Which of the following is not a type of OSPF packet? |
A. | hello |
B. | link-state request |
C. | link-state response |
D. | link-state ack |
Answer» C. link-state response | |
Explanation: The five types of OSPF packets are: Hello, Database description, Linkstate request, Link-state update, and Link-state ACK. There is no Link-state response packet; the neighbor router sends a Link-state update packet as a response to the Linkstate request packet if there is an update in the routing table. |
610. |
In OSPF header, which field is used to detect errors in the packet? |
A. | type |
B. | area id |
C. | authentication type |
D. | checksum |
Answer» D. checksum | |
Explanation: The checksum field is used to detect errors. It makes sure that the data portions that are being sent are all in integrity. It can detect duplicated bits. Once an error is detected, the sender has to re-transmit the data as it won’t receive an acknowledgment. |
611. |
The outcome of Dijkstra’s calculation is used to populate the __________ |
A. | topology table |
B. | routing table |
C. | neighbor table |
D. | adjacency table |
Answer» B. routing table |
612. |
What is the IP protocol number for OSPF packets? |
A. | 89 |
B. | 86 |
C. | 20 |
D. | 76 |
Answer» A. 89 |
613. |
Which packet is NOT an OSPF packet type? |
A. | lsu |
B. | lsr |
C. | dbd |
D. | query |
Answer» D. query |
614. |
Which multicast address does the OSPF Hello protocol use? |
A. | 224.0.0.5 |
B. | 224.0.0.6 |
C. | 224.0.0.7 |
D. | 224.0.0.8 |
Answer» A. 224.0.0.5 |
615. |
DBD packets are involved during which two states? |
A. | exstart and exchange |
B. | loading and two-way |
C. | init and full |
D. | down and loading |
Answer» A. exstart and exchange |
616. |
At which interval does OSPF refresh LSAs? |
A. | 10 seconds |
B. | 30 seconds |
C. | 30 minutes |
D. | 1 hour |
Answer» D. 1 hour |
617. |
Which field is NOT a field within an OSPF packet header? |
A. | packet length |
B. | router id |
C. | authentication type |
D. | maxage time |
Answer» D. maxage time |
618. |
Which two commands are required for basic OSPF configuration? |
A. | “[network mask] area [area-id]” and “router ospf [process-id]” |
B. | “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]” |
C. | only “router ospf [process-id]” |
D. | “[wildcard-mask] area [area-id]” and “router ospf [process-id]” |
Answer» D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]” |
619. |
Which OSPF show command describes a list of OSPF adjacencies? |
A. | show ip ospf interface |
B. | show ip ospf |
C. | show ip route |
D. | show ip ospf neighbor |
Answer» D. show ip ospf neighbor |
620. |
Datagram switching is done at which layer of OSI model? |
A. | network layer |
B. | physical layer |
C. | application layer |
D. | transport layer |
Answer» A. network layer |
621. |
Packets in datagram switching are referred to as ________ |
A. | switches |
B. | segments |
C. | datagrams |
D. | data-packets |
Answer» C. datagrams |
622. |
Datagrams are routed to their destinations with the help of ________ |
A. | switch table |
B. | segments table |
C. | datagram table |
D. | routing table |
Answer» C. datagram table |
623. |
The main contents of the routing table in datagram networks are ___________ |
A. | source and destination address |
B. | destination address and output port |
C. | source address and output port |
D. | input port and output port |
Answer» B. destination address and output port |
624. |
Which of the following is true with respect to the delay in datagram networks? |
A. | delay is greater than in a virtual circuit network |
B. | each packet may experience a wait at a switch |
C. | delay is not uniform for the packets of a message |
D. | all of the mentioned |
Answer» D. all of the mentioned |
625. |
Which of the following is false with respect to the datagram networks? |
A. | number of flows of packets are not limited |
B. | packets may not be in order at the destination |
C. | path is not reserved |
D. | delay is the same for all packets in a flow |
Answer» D. delay is the same for all packets in a flow |
626. |
Network layer firewall works as a __________ |
A. | frame filter |
B. | packet filter |
C. | content filter |
D. | virus filter |
Answer» B. packet filter |
627. |
Network layer firewall has two sub-categories as _________ |
A. | state full firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network layer firewall and session layer firewall |
Answer» A. state full firewall and stateless firewall |
628. |
Which of the following is / are the types of firewall? |
A. | packet filtering firewall |
B. | dual homed gateway firewall |
C. | screen host firewall |
D. | dual host firewall |
Answer» A. packet filtering firewall |
629. |
A proxy firewall filters at _________ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» D. application layer |
630. |
A packet filter firewall filters at __________ |
A. | physical layer |
B. | data link layer |
C. | network layer or transport layer |
D. | application layer |
Answer» C. network layer or transport layer |
631. |
What is one advantage of setting up a DMZ with two firewalls? |
A. | you can control where traffic goes in three networks |
B. | you can do stateful packet filtering |
C. | you can do load balancing |
D. | improved network performance |
Answer» C. you can do load balancing |
632. |
A stateful firewall maintains a ___________ which is a list of active connections. |
A. | routing table |
B. | bridging table |
C. | state table |
D. | connection table |
Answer» A. routing table |
633. |
Performance management is closely related to _________ |
A. | proactive fault management |
B. | fault management |
C. | reactive fault management |
D. | preventive fault management |
Answer» B. fault management |
634. |
Which of the following networks supports pipelining effect? |
A. | circuit-switched networks |
B. | message-switched networks |
C. | packet-switched networks |
D. | stream-switched networks |
Answer» C. packet-switched networks |
635. |
MIB is a collection of groups of objects that can be managed by __________ |
A. | smtp |
B. | udp |
C. | snmp |
D. | tcp/ip |
Answer» C. snmp |
636. |
A network management system can be divided into ___________ |
A. | three categories |
B. | five broad categories |
C. | seven broad categories |
D. | ten broad categories |
Answer» B. five broad categories |
637. |
Ping can _________ |
A. | measure round-trip time |
B. | report packet loss |
C. | report latency |
D. | all of the mentioned |
Answer» D. all of the mentioned |
638. |
Ping sweep is a part of _________ |
A. | traceroute |
B. | nmap |
C. | route |
D. | ipconfig |
Answer» B. nmap |
639. |
ICMP is used in _________ |
A. | ping |
B. | traceroute |
C. | ifconfig |
D. | both ping & traceroute |
Answer» D. both ping & traceroute |
640. |
__________ command is used to manipulate TCP/IP routing table. |
A. | route |
B. | ipconfig |
C. | ifconfig |
D. | traceroute |
Answer» A. route |
641. |
Which of the following is not related to ipconfig in Microsoft Windows? |
A. | display all current tcp/ip network configuration values |
B. | modify dhcp settings |
C. | modify dns settings |
D. | trace the routers in the path to destination |
Answer» D. trace the routers in the path to destination |
642. |
__________ allows checking if a domain is available for registration. |
A. | domain check |
B. | domain dossier |
C. | domain lookup |
D. | domain registers |
Answer» A. domain check |
643. |
Choose the wrong statement from the following. |
A. | nslookup is used to query a dns server for dns data |
B. | ping is used to check connectivity |
C. | pathping combines the functionality of ping with that of route |
D. | ifconfig can configure tcp/ip network interface parameters |
Answer» C. pathping combines the functionality of ping with that of route |
644. |
Ethernet frame consists of ____________ |
A. | mac address |
B. | ip address |
C. | default mask |
D. | network address |
Answer» A. mac address |
645. |
What is start frame delimeter (SFD) in ethernet frame? |
A. | 10101010 |
B. | 10101011 |
C. | 00000000 |
D. | 11111111 |
Answer» B. 10101011 |
646. |
MAC address is of ___________ |
A. | 24 bits |
B. | 36 bits |
C. | 42 bits |
D. | 48 bits |
Answer» D. 48 bits |
647. |
Ethernet in metropolitan area network (MAN) can be used as ___________ |
A. | pure ethernet |
B. | ethernet over sdh |
C. | ethernet over mpls |
D. | all of the mentioned |
Answer» D. all of the mentioned |
648. |
A point-to-point protocol over ethernet is a network protocol for __________ |
A. | encapsulating ppp frames inside ethernet frames |
B. | encapsulating ehternet framse inside ppp frames |
C. | for security of ethernet frames |
D. | for security of ppp frames |
Answer» A. encapsulating ppp frames inside ethernet frames |
649. |
High speed ethernet works on _________ |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | unshielded twisted pair cable |
Answer» C. optical fiber |
650. |
The maximum size of payload field in ethernet frame is __________ |
A. | 1000 bytes |
B. | 1200 bytes |
C. | 1300 bytes |
D. | 1500 bytes |
Answer» D. 1500 bytes |
651. |
What is interframe gap? |
A. | idle time between frames |
B. | idle time between frame bits |
C. | idle time between packets |
D. | idle time between networks |
Answer» A. idle time between frames |
652. |
In wireless ad-hoc network _________ |
A. | access point is not required |
B. | access point is must |
C. | nodes are not required |
D. | all nodes are access points |
Answer» A. access point is not required |
653. |
In wireless distribution system __________ |
A. | multiple access point are inter-connected with each other |
B. | there is no access point |
C. | only one access point exists |
D. | access points are not required |
Answer» A. multiple access point are inter-connected with each other |
654. |
A wireless network interface controller can work in _______ |
A. | infrastructure mode |
B. | ad-hoc mode |
C. | both infrastructure mode and ad-hoc mode |
D. | wds mode |
Answer» C. both infrastructure mode and ad-hoc mode |
655. |
In wireless network an extended service set is a set of ________ |
A. | connected basic service sets |
B. | all stations |
C. | all access points |
D. | connected access points |
Answer» A. connected basic service sets |
656. |
Mostly ________ is used in wireless LAN. |
A. | time division multiplexing |
B. | orthogonal frequency division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» B. orthogonal frequency division multiplexing |
657. |
Which one of the following event is not possible in wireless LAN? |
A. | collision detection |
B. | acknowledgement of data frames |
C. | multi-mode data transmission |
D. | connection to wired networks |
Answer» A. collision detection |
658. |
What is Wired Equivalent Privacy (WEP)? |
A. | security algorithm for ethernet |
B. | security algorithm for wireless networks |
C. | security algorithm for usb communication |
D. | security algorithm for emails |
Answer» B. security algorithm for wireless networks |
659. |
What is WPA? |
A. | wi-fi protected access |
B. | wired protected access |
C. | wired process access |
D. | wi-fi process access |
Answer» A. wi-fi protected access |
660. |
What is internet? |
A. | a single network |
B. | a vast collection of different networks |
C. | interconnection of local area networks |
D. | interconnection of wide area networks |
Answer» B. a vast collection of different networks |
661. |
To join the internet, the computer has to be connected to a _________ |
A. | internet architecture board |
B. | internet society |
C. | internet service provider |
D. | different computer |
Answer» C. internet service provider |
662. |
ISP exchanges internet traffic between their networks by __________ |
A. | internet exchange point |
B. | subscriber end point |
C. | isp end point |
D. | internet end point |
Answer» A. internet exchange point |
663. |
Which of the following protocols is used in the internet? |
A. | http |
B. | dhcp |
C. | dns |
D. | dns, http and dns |
Answer» D. dns, http and dns |
664. |
The size of an IP address in IPv6 is _________ |
A. | 32 bits |
B. | 64 bits |
C. | 128 bits |
D. | 265 bits |
Answer» C. 128 bits | |
Explanation: an ipv6 address is 128 bits long. therefore, 2128 i.e. 340 undecillion addresses are possible in ipv6. ipv4 has only 4 billion possible addresses and ipv6 would be a brilliant alternative in case ipv4 runs out of possible new addresses. |
665. |
Internet works on _______ |
A. | packet switching |
B. | circuit switching |
C. | both packet switching and circuit switching |
D. | data switching |
Answer» A. packet switching |
666. |
Which one of the following is not an application layer protocol used in internet? |
A. | remote procedure call |
B. | internet relay chat |
C. | resource reservation protocol |
D. | local procedure call |
Answer» C. resource reservation protocol |
667. |
Which protocol assigns IP address to the client connected in the internet? |
A. | dhcp |
B. | ip |
C. | rpc |
D. | rsvp |
Answer» A. dhcp |
668. |
Which one of the following is not used in media access control? |
A. | ethernet |
B. | digital subscriber line |
C. | fiber distributed data interface |
D. | packet switching |
Answer» D. packet switching |
669. |
An interconnected collection of piconet is called ___________ |
A. | scatternet |
B. | micronet |
C. | mininet |
D. | multinet |
Answer» A. scatternet |
670. |
In a piconet, there can be up to ________ parked nodes in the network. |
A. | 63 |
B. | 127 |
C. | 255 |
D. | 511 |
Answer» C. 255 |
671. |
Bluetooth is the wireless technology for __________ |
A. | local area network |
B. | personal area network |
C. | metropolitan area network |
D. | wide area network |
Answer» B. personal area network |
672. |
Bluetooth uses __________ |
A. | frequency hopping spread spectrum |
B. | orthogonal frequency division multiplexing |
C. | time division multiplexing |
D. | channel division multiplexing |
Answer» A. frequency hopping spread spectrum |
673. |
What is A2DP (advanced audio distribution profile)? |
A. | a bluetooth profile for streaming audio |
B. | a bluetooth profile for streaming video |
C. | a bluetooth profile for security |
D. | a bluetooth profile for file management |
Answer» A. a bluetooth profile for streaming audio |
674. |
In a piconet, one master device ________ |
A. | can not be slave |
B. | can be slave in another piconet |
C. | can be slave in the same piconet |
D. | can be master in another piconet |
Answer» B. can be slave in another piconet |
675. |
Bluetooth transceiver devices operate in ______ band. |
A. | 2.4 ghz ism |
B. | 2.5 ghz ism |
C. | 2.6 ghz ism |
D. | 2.7 ghz ism |
Answer» A. 2.4 ghz ism |
676. |
Bluetooth supports _______ |
A. | point-to-point connections |
B. | point-to-multipoint connection |
C. | both point-to-point connections and point-to-multipoint connection |
D. | multipoint to point connection |
Answer» C. both point-to-point connections and point-to-multipoint connection |
677. |
A scatternet can have maximum __________ |
A. | 10 piconets |
B. | 20 piconets |
C. | 30 piconets |
D. | 40 piconets |
Answer» A. 10 piconets |
678. |
WiMAX stands for ___________ |
A. | wireless maximum communication |
B. | worldwide interoperability for microwave access |
C. | worldwide international standard for microwave access |
D. | wireless internet maximum communication |
Answer» B. worldwide interoperability for microwave access |
679. |
WiMAX provides ________ |
A. | simplex communication |
B. | half duplex communication |
C. | full duplex communication |
D. | no communication |
Answer» C. full duplex communication |
680. |
WiMAX uses the _________ |
A. | orthogonal frequency division multiplexing |
B. | time division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» A. orthogonal frequency division multiplexing |
681. |
Which of the following modulation schemes is supported by WiMAX? |
A. | binary phase shift keying modulation |
B. | quadrature phase shift keying modulation |
C. | quadrature amplitude modulation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
682. |
WiMAX MAC layer provides an interface between ___________ |
A. | higher transport layers and physical layer |
B. | application layer and network layer |
C. | data link layer and network layer |
D. | session layer and application layer |
Answer» A. higher transport layers and physical layer |
683. |
For encryption, WiMAX supports _______ |
A. | advanced encryption standard |
B. | triple data encryption standard |
C. | advanced encryption standard and triple data encryption standard |
D. | double data encryption standard |
Answer» C. advanced encryption standard and triple data encryption standard |
684. |
WiMAX provides _______ |
A. | voip services |
B. | iptv services |
C. | both voip and iptv services |
D. | no iptv services |
Answer» C. both voip and iptv services |
685. |
WiMAX is mostly used for __________ |
A. | local area network |
B. | metropolitan area network |
C. | personal area network |
D. | wide area network |
Answer» B. metropolitan area network |
686. |
Which of the following frequencies is not used in WiMAX for communication? |
A. | 2.3 ghz |
B. | 2.4 ghz |
C. | 2.5 ghz |
D. | 3.5 ghz |
Answer» B. 2.4 ghz |
687. |
SONET stands for ___________ |
A. | synchronous optical network |
B. | synchronous operational network |
C. | stream optical network |
D. | shell operational network |
Answer» A. synchronous optical network |
688. |
In SONET, STS-1 level of electrical signalling has the data rate of _________ |
A. | 51.84 mbps |
B. | 155.52 mbps |
C. | 2488.320 mbps |
D. | 622.080 mbps |
Answer» A. 51.84 mbps |
689. |
The path layer of SONET is responsible for the movement of a signal _________ |
A. | from its optical source to its optical destination |
B. | across a physical line |
C. | across a physical section |
D. | back to its optical source |
Answer» B. across a physical line |
690. |
The photonic layer of the SONET is similar to the __________ of OSI model. |
A. | network layer |
B. | data link layer |
C. | physical layer |
D. | transport layer |
Answer» C. physical layer |
691. |
In SONET, each synchronous transfer signal STS-n is composed of __________ |
A. | 2000 frames |
B. | 4000 frames |
C. | 8000 frames |
D. | 16000 frames |
Answer» C. 8000 frames |
692. |
A linear SONET network can be ________ |
A. | point-to-point |
B. | multi-point |
C. | both point-to-point and multi-point |
D. | single point |
Answer» C. both point-to-point and multi-point |
693. |
Automatic protection switching in linear network is defined at the _______ |
A. | line layer |
B. | section layer |
C. | photonic layer |
D. | path layer |
Answer» A. line layer |
694. |
A unidirectional path switching ring is a network with __________ |
A. | one ring |
B. | two rings |
C. | three rings |
D. | four rings |
Answer» B. two rings |
695. |
Real-time transport protocol (RTP) is mostly used in _________ |
A. | streaming media |
B. | video teleconference |
C. | television services |
D. | all of the mentioned |
Answer» D. all of the mentioned |
696. |
RTP is used to ________ |
A. | carry the media stream |
B. | monitor transmission statistics of streams |
C. | monitor quality of service of streams |
D. | secure the stream |
Answer» A. carry the media stream |
697. |
RTP provides the facility of jitter ____________ |
A. | media stream |
B. | expansion |
C. | media modification |
D. | security |
Answer» A. media stream |
698. |
Which protocol provides the synchronization between media streams? |
A. | rtp |
B. | rtcp |
C. | rpc |
D. | rtct |
Answer» B. rtcp |
699. |
An RTP session is established for ____________ |
A. | each media stream |
B. | all media streams |
C. | some predefined number of media streams |
D. | no media stream |
Answer» A. each media stream |
700. |
RTP can use __________ |
A. | unprevileleged udp ports |
B. | stream control transmission protocol |
C. | datagram congestion control protocol |
D. | all of the mentioned |
Answer» D. all of the mentioned |
Done Reading?