Networking, MCQ Questions & Answers, prepared by SONU HUTSON(GK EDITORIAL), Re-edited by PRANAB DAS, SARASWATI GHOSH, SURAJ RABIDAS & Podmeswar Bora, Only for fair use

 


 

 

1. What is Availability?

Ans. it ensure that system work promptly and service is not denied to authorized users.

 

2. PAN stands for _________

a) Personal area network

b) Prompt area network

c) Private area network

d) Pear area network

Ans. A

 

3. LAN stands for_______

a) Local Area network

b) Line area network

c) live area network

d) Long area network

Ans. A

4. CAN stands for _______

a) Campus area network

b) College area network

c) Center area network

d) Close area network

Ans. A

5. WAN stands for _______

a) wide area network

b) wireless area network

c) wast area network

d) work area network

Ans. A

6. GAN stands for__________

a) Global area network

b) Ground area network

c) Gold area network

d) Globe access network

Ans. A

7. ISP stands for_______.

a) Internet service provider

b) Indian special police

c) International service provider

d) Inspiration

Ans. A

8. IPS stands for _______.

a) IN plane switching

b) Instructions Per second

c) Indian police service

d) Both a and b Ans.

D 9. NTP stands for _______.

a) Network time protocol

b) New terminal Point

c) Network time policy

d) Network term policy

Ans. A

10. SMS stands for________.

a) Short message service

b) Small message service

c) special message service

d) short module set

Ans. A

11. SMTP stands for ________.

a) Simple mail transfer protocol

b) Short message transfer protocol

c) Small message test protocol

d) super message test protocol

Ans. A

12. TCP stands for _____.

a) transmission control protocol

b) time control protocol

c) total control protocol

d) transmission circuit protocol

Ans. A

13. TN stands for _______.

a) twisted nematic

b) total number

c) trial network

d) traffic network

Ans. A

14. URL stands for _______.

a) Union resource locator

b) Uniform resource locator

 c) Union relay light

d) Under relay light

Ans. B

15. NTP stands for _________.

a) Network time protocol

b) New time protocol

c) network threat protocol

d) network term policy

Ans. A

16. www stands for __________.

a) world wide web

b) whole world web

c) world wide wire

d) weird world web

Ans. A

17. The protocol used to automatically assign IP address to a newly connected host in a network is called ______.

 (a) Dynamic Host Configuration Protocol (DHCP)

(b) Transmission Control Protocol (TCP)

(c) User Datagram Protocol (UDP)

(d) File Transfer Protocol (FTP)

Ans. a

18. Third generation of firewall offers_____ to prevent web fingerprint attacks.

(a) web application firewall

(b) packet filter

(c) stateful filter

(d) none of them

Ans. a

19. Who invent www ?

a) bob kahn

 b) Tim berners lee

c) vint cerf

d) lady ada lovelace

Ans. B

20. WWW invent in the year__________.

a) 1989

b) 1984

c) 1999

d) 1985

Ans. A

21. TLD stands for_________.

 a) time limit domain

b) top level domain

c) try low level domain

d) tata limited department

Ans. B

22. URL stands for________.

a) user relation line

b) uniform resource locator

c) union relay line

d) user roll lime

Ans. B

23. “.com” domain definition is ________.

a) government

b) education

c) commercial

d) international

Ans. C

24. DNS stands for ________.

a) digital name system

b) domain name system

c) direct name system

d) digital name subscribe

Ans. B

25. communication means_________.

a) sending or receiving information

 b) sending information

c) receiving information

 d) none of these

Ans. A

26. The identity management system binds logical addresses to ______for reputed servers.

(a) MAC address

(b) specific programs

(c) other computers

(d) none of them

Ans. a

27. Exchange of data between two devices using some form of transmission media is called _________. a) technology

b) data communication

 c) recording

d) tracking

Ans. B

 28. IPS in firewall stands for ______.

(a) Intrusion Protection System

(b) Intrusion Prevention Software

(c) Internet Prevention System

(d) Intrusion Prevention System

Ans. d

29. when data can transfer both side but at a time only one direction can send information is called_______.

 a) Half duplex

b) simplex

c) full duplex

d) communication

Ans. A

30. when data can transfer both side same time data transmission is called _________.

a) Half duplex

b) simplex

c) full duplex

d) communication

Ans. C

31. Telnet stands for_________.

a) Telecommunication network

b) telephone net

c) tele net

d) tele network

Ans. A

32. NFS stands for__________.

a) new file system

b) network file system

c) new file storage

d) need file storage

Ans. B

33. NAS stands for _______.

a) network attached storage

b) network access storage

c) network activity sport

d) new active system

Ans. A

34.Third generation firewalls were otherwise called______ .

(a) packet filters

(b) stateful filters

(c) application filters

(d) none of them

Ans. c

35. SSH stands for __________.

a) secure socket shell

b) secure shell

c) both A and B

d) secure session hall

Ans. C

36. NETBIOS stands for___________.

a) network basic input output system

b) network bill open

c) network basic inter os

d) network bulls

Ans. A

37. RPC stands for_______.

 a) relay point company

b) remote procedure call

c) right police company

 d) ray privacy

Ans. B

38. UDP stands for_________.

a) user datagram protocol

b) uniq data protocol

c) user diagram protocol

d) user data policy

Ans. A

39. IPSEC stands for__________.

a) input second

b) IP security

c) input secondry

d) inline point section

Ans. B

40. IETF stands for___________.

a) internet engineering task force

b) internet force

c) intel telephone

d) intex phone

Ans. A

41. IGMP stands for____________.

a) internet group management protocol

b) instagram mp

c) instagram photo

d) ig map

Ans. A

42. PPP stands for_________.

a) personal private place

b) public private partnership

c) pear private policy

d) pure policy protocol

 Ans. B

43. Fiber optic cable are made by______.

a) copper

b) plastic

c) glass

d) Both B and C

Ans. D

44. __________is a physical arrangement of all computers.

a) setting

b) topology

c) network

d) satellite

Ans. B

45. Topology is also called ________.

a) network b) bus

c) network architecture

d) wire setting

Ans. C

46.Second generation firewalls were otherwise called______ .

(a) packet filters

(b) stateful filters

(c) application filters

(d) none of them

Ans. b

47. In _______ topology , all computers are connected in a loop or circle via cable.

a) tree

b) hybrid

c) ring

d) bus

Ans. C

48. First generation firewalls were otherwise called ______.

(a) packet filters

(b) stateful filters

(c) application filters

(d) none of them

Ans. a

49. _________topology is a mixture of two or more than 2 topology.

a) tree

b) hybrid

c) ring

d) bus

Ans. B

50. How many layers in OSI model ?

a) 5

b) 4

c) 9

d) 7

Ans. D

51. OSI stands for_________.

a) open system interconnection

b) operation information

c) open system

d) only system

Ans. a

52.Third general firewalls operated at layer _______of the OSI model.

(a) 3

(b) 4

(c) 5

(d) 7

Ans. d

53. ISO stands for__________.

a) international organization of standardization

b) inter service organization

c) intel service organization

d) inner service option

Ans.

54. Network communication protocols are based on the standards of ________.

a) app model

b) OSI model

c) ISO model

d) Heetson model

Ans. b

55. FTP stands for_________.

a) file transfer protocol

b) file total protect

c) file tip policy

d) fully tight policy

Ans. a

56. HTTP stands for________.

a) high text transfer protocol

b) hyper text transfer protocol

c) higher text transfer policy

d) none of these Ans. b

57. DHCP stands for_________.

a) dynamic host configuration protocol

b) dynamic host cup policy

c) double host copy policy

d) double host configuration protocol

 Ans. a

58. ASCII stands for_________.

a) american social company information

 b) American standard code for information interchange

c) apple socity code interchange policy

d) American state code for information interchange

Ans. b

59. CORE of the OSI model is known as __________.

a) network layer b) transport layer

c) datalink layer

d) application layer

 Ans. b

60. ICMP stands for___________.

a) internet control message protocol

b) inter company money policy

c) interconnection money policy

d) international color management protocol

Ans. a

61. MAC stands for__________.

a) money access control

b) media access control

c) media access company

 d) more archery corp.

Ans. b

62. Transmission of data rate decided by ___________

a) network layer

b) transport layer

 c)physical layer

d) application layer

Ans. c

63. POP-3 stands for__________.

a) post office protocol

b) private office protocol

 c) post office policy

d) private office policy

Ans. a  

64. BGP stands for__________.

a) boarder gateway policy

b) boarder gateway protocol

c) broadway gateway protocol

d) both B and C

 Ans. d

65. SNMP stands for______________.

 a) simple network management protocol

b) simple network model protocol

c) simple network module policy

d) simple network model policy

Ans. a

66. RIP stands for__________.

a) relay info. Policy

b) routing information protocol

c) routing inter protocol

 d) route in policy

Ans. b

67. OSPF stands for____________.

a) open system path first

b) OS protocol firm

c) OS policy first

d) open policy file

Ans. a

68. NOS stands for__________.

a) Network open system

b) network operating system

c) national open system

d) new oriented policy

Ans. b

69. UUCP stands for__________.

a) Unix to Unix copy protocol

 b) Union corporation

c) union corporation policy

d) unix to unix protocol

Ans. a

70. NNTP stands for__________.

a) Network news transfer protocol

b) network news transfer policy

c) network news term policy

d) network news terminal policy

Ans. a

71. C-DOT stands for__________.

a) center of dot

b) center for development of telematics

c) center digital technology

d) none of these

Ans. b

72. ISH stands for__________.

 a) Information super highway

b) indian super highway

c) international highway

d) Italy highway

Ans. a

73. NICNET stands for__________.

a) national information network

b) national information center network

c) news network

d) nice network

Ans. b

74. At the _____ layer the data unit is transformed into the corresponding electromagnetic signal.

a) application

 b) network

c) physical

d) data link

Ans. c

75. The ________ layer oversees the delivery of a data unit between two systems on different networks.

a) application

b) network

c) physical

d) data link

Ans. b

76. _________ layer provide a mechanism to route packets from network to network.

a) application

b) network

c) physical

d) data link

Ans. b

77. ______ layer is responsible for removing the network layer header as the data unit moves to the transport layer.

a) application

 b) network

c) physical

d) data link

 Ans. b

78. _______layer may create a connection ( a single logical path between the source and destination that is associated with all the packets of a message) between two end ports.

a) transport

b) network

c) physical

d) data link

Ans. a

79. Network virtual terminal is a service of ________ layer.

a) application

b) network

c) physical

d) data link

Ans. a

80. Modem is required for the__________.

a) data communication

b) internet connection

c) phone calls

d) routing

Ans. b

81. The process of Transferring files from a computer on the internet to your computer is called________.

a) Uploading

b) Sending

c) Downloading

d) Sharing

Ans. c

82. VOIP stands for_________.

a) voice over IP

b) Voice I pad

c) Voice Pad

d) Voice input Processing

Ans. a

83. _____is an error reporting protocol.

a) IGMP

b) ICMP

c) Mail slot

d) TCP

Ans. b

84. Group of electrical wires used to send data between two or more components. Provide transportation of data.

a) Data bus

b) Topology

c) Wired board

d)PCB

Ans. a  

85. _________ is used to specify a physical address.

a) Address Bus

b) Physical layer

c) PCB

d) Address pointer

Ans. a

86. Second general firewalls operated at layer______ of the OSI model.

(a) 3

(b) 4

(c) 5

(d) 7

Ans. b

87. ______ are computers that provide resources to other computers to a : Mainframe computer Ans. Servers 88. First general firewalls operated at layer______ of the OSI model.

(a) 3

(b) 4

(c) 5

(d) 7

Ans. a

89. The set of layer‟s and Protocols is known as ______. Ans. Network Architecture 90. The WAN‟s are also referred to as _______ Network.

Ans. Long Haul

91. Data rate high in ______ then WAN.

Ans. LAN

92. Protocol is a set of Forma Operating ______.

Ans. Rules

93. Video conferencing is also called ________. Ans. Teleconferencing 94. One way broadcast are called ______

Ans. Cybercast

95. When the baud/bit rate is higher the character are transmitted _______.

Ans. Faster

96. Baud is a Measure of Speed of _______.

Ans. Modem

97. Keyboard work on _______ communication mode.

Ans. simplex

98. Bluetooth work on________ communication mode.

Ans. Half Duplex

99. What is Broadcasting?

Ans. Broadcasting is the Process of sending data Packets to multiple recipient all at once. Ex: Radio, Live TV show

100. Filtering connections and disallowing prohibited connections is carried out using ______.

(a) MODEM

(b) router

(c) firewall

(d) bridge

Ans. c

 

101. What is the delay that occur during the Playback of a stream known as _____.

Ans. Jitter

 

102. To create the last end of fiber optical cable ______ is mostly used.

Ans. Glass

 

103. The Transmission used in network is called_____.

Ans. Channel

 

104. To create network of networks_____ Developed

Ans. IP

 

105. _____ topology of network is a Passive topology.

Ans. Bus

 

106. In twisted pair cable one wire interfering with another wire is called ______.

Ans. Cross talk

 

107. Server operates on _______

Ans. Client/Server Architecture

 

108. _____ Protocol supports both online and offline retrieval of email.

Ans. IMAP

 

109. A list of Protocols used by a system, one protocol per layer is called:

 Ans. Protocol suit

 

 110. Coaxial cables have conducted with _______.

Ans. Common Axis

 

111. Bridge works in ______ layer.

Ans. Transport

 

112. _____ helps in remote login.

Ans. FTP

 

113. Connection to the Internet requires enforcement of______ security.

(a) low

(b) high

(c) zero

(d) no

Ans. b

 

114. IPV6 is an _____ address whose binary bits are separated by a colon.

Ans. Alphanumeric

 

115. _____ is a text based computer Protocol Ans. Telnet 116. Topology where every node is connected to two other nodes is ____ topology. Ans. Ring P a g e | 254

117. An HTTP request contains ____ Parts. Ans. 3

 

118.Which layer in OSI model performs network routing, flow control and error control function?

A. Network layer

B. Session layer

C. Physical layer

D. Data link layer

Ans. a

 

119.What is the full form of IP?

A. internet protect

B. intranet protocol

C. internet protocol

D. international protocol

Ans. c

 

120.What is the full form of TCP?

A. Test Control Protocol

B. Transfer Control Protocol

C. Transport Control Protocol

D. Transmission Control Protocol

Ans. d

 

121.Which layer is the layer 2 in OSI network model?

A. Session lay

 b. Physical layer

C. Data link layer

D. Transport layer

Ans. c

 

122.Which layer is the layer 4 in OSI model?

A. Session layer

B. Network layer

C. Data link layer

D. Transport layer

Ans. d

 

123.Which is the 6th layer in OSI communication model?

A. Session layer

B. Network layer

C. Application layer

D. Presentation layer

Ans. d

 

124.What is the abbreviation of OSI?

A. Open Source Internet

B. Open System Interaction

C. Open Source Interconnection

D. Open System Interconnection

Ans. d

 

125.What is the full form of EFT?

A. Electronic Form Transfer

B. Electronic Fund Transfer

C. Electronic Field Transfer

D. Electronic Format Transfer

Ans. b

P a g e | 255

 

126.Which is an example for WAN?

A. Ethernet

B. Home network

C. Campus network

D. Bluetooth network

Ans. a

 

127.What is the full form of ADSL?

A. Asymmetrical Digital System Line

B. Automatic Digital Subscriber Line

C. Asymmetrical Digital Subscriber Line

D. Asynchronous Digital Subscriber Line

Ans. c

 

128.Which is the layer 3 in OSI model?

A. Network layer

B. Session layer

C. Physical layer

D. Data link layer

Ans. a

 

129.Which is a reference tool for understanding data communication between any two network system?

A. LAN

B. WAN

C. ISO model

D. OSI model

Ans. d

 

130.What is called the interconnected computer systems located at different places?

A. internet

B. computer layout

C. computer network

D. connectivity of computer

Ans. c

 

131.Which topology combines characteristics of linear bus and star topologies?

A. Bus

B. Star

C. Tree

D. Mesh

Ans. c

 

132.How many pairs of wires contains in category 5 UTP cable?

A. 3

B. 4

C. 5

D. 6

Ans. b

 

133.What is the maximum speed supported by category 5 UTP cable?

A. 1mbps

B. 10mbps

.C 100mbps

D. 1000mbps

Ans. c

P a g e | 256

 

 

134. The address 2001:db8:a0b:12f0::1 is formatted in _____.

(a) IPV0

(b) IPV2

(c) IPV4

(d) IPV6

Ans. d

 

135.Which device is installed in a subscriber‟s telephone line to allow both ADSl and regular voice (telephone) services to be used at the same time?

A. Hub

B. Switch

C. MODEM

D. Micro filter

Ans. d

 

136.Which layer of OSI Model, transfer data between network entities?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

Ans. d

 

137.Which device connects multiple network segments along with the data link layer?

A. Hub

B. Bridge

C. Router

D. Switch

Ans. b

 

138.Which device is used to amplify or regenerate digital signals received while sending them from one port of a network into another?

A. Hub

B. Bridge

C. Switch

D. Repeater

Ans. d

 

139.Which device modulates analog signal to encode digital information and demodulates carrier signal to decode the transmitted information over the telephone network?

A. Hub

B. Bridge

C. Switch

D. MODEM

Ans. d

 

140.Which device is used to connect one network with another network that uses different protocols?

A. Hub

B. Router

C. Switch

D. Gateway

Ans. d

 

141.Which device forwards data packet between computer network?

A. Hub

B. Router

C. Switch

D. Gateway

Ans. b

P a g e | 257

 

 

142.What is the speed of standard 10 base T cable?

A. 1 mbps

B. 10 mbps

C. 100 kbps

D. 100 mbps

Ans. b

 

143.Which type of cable is used in 10 base-FL cable standard?

A. UTP

B. STP

C. Co-axial

D. Fibre optic

Ans. d

 

144.What is the speed of 100BASE-TX cable?

A. 1 mbps

B. 10 mbps

C. 100 kbps

D. 100 mbps

Ans. c

 

145. Which is the standard connector for category-5, unshielded twisted pair cabling?

A. RJ11

B. RJ14

C. RJ25

D. RJ45

Ans. d

 

146.How many pairs of wires are there in category 1 UTP cables?

A. 1

B. 2

C. 3

D. 4

Ans. a

 

147.Which is an application layer of internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection?

A. IP

B. FTP

C. UDP

D. POP

Ans. d

 

148.Which layer in OSI model provides transfer the data between end users?

A. Session layer

B. Network layer

C. Data link layer

D. Transport layer

Ans. d

 

149.What is the purpose of the last three layers in OSI model?

A. common application services

B. data presentation within the end-user system

C. passing traffic through the network to an end system

D. manage the dialogue between end user application process

Ans. c

 

150.Which layers of OSI model is the router operate?

A. Layer 2

B. Layer 3

C. Layer 6

D. Layer 7

Ans. b

P a g e | 258

 

 

151.Which layer of OSI network model does repeater works?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

Ans. a

 

152.Which is a standard network protocol used to transfer files from one host or to another host over a TCP based network, such as the internet?

A. FTP

B. TCP

C. UDP

D. SMTP

Ans. a

 

153.Which is a network protocol used on the internet or LAN to provide a bi-directional interactive text oriented communication facility using a virtual terminal connection?

A. FTP

B. TCP

C. UDP

D. Telnet

Ans. d

 

154. Connecting several computers and devices using wired or wireless technology is called _____.

(a) hard disk

(b) RAM

(c) pen drive

(d) networking

Ans. d

 

155. Internet is constituted of _______ .

(a) network of networks

(b) hard disk

(c) DVD

(d) pen drive

Ans. a

 

156. Computers and devices can be connected using __________ technology to create a network.

(a) wired

(b) wireless

 (c) both a & b

(d) neither a nor b

Ans. c

 

157. The procedure used by computers connected in a network for data exchange is called network .

(a) topology

(b) protocol

(c) firewall

(d) antivirus

Ans. b

 

158. The computer which separates a local network from external Internet is called network ______ .

(a) topology

(b) protocol

(c) firewall

(d) antivirus

Ans. c

 

159. The piece of software which prevents malicious software from entering a computer is called network ______.

(a) topology

(b) protocol

(c) firewall

(d) antivirus

Ans. d

 

160. Most of the wired network connections use_____ .

(a) Optical Fibre Cable (OFC)

(b) USB cable

(c) pen drive

(d) hard drive

Ans. A

 P a g e | 259

 

 

161. The port for connecting broadband cable to a computer is called ______.

(a) ethernet port

(b) Registered Jack 45 (RJ-45)

(c) both a & b

(d) none of them

Ans. c

 

162. Wireless network connections use ______technologies.

(a) Wireless Fidelity (WiFi)

(b) Bluetooth

(c) both a & b

(d) neither a nor b

Ans. c

 

163. _______ are the hardware devices that help the computer to connect to a network.

(a) Routers

(b) MODEMs

(c) Wireless MODEMs

(d) all of them

Ans. d

 

164. MODEM stands for _______.

(a) MODulation DEMocracy

(b) MODulation DEModulation

(c) MODern DEModulation

(d) MODerate DEModulation

Ans. b

 

165. Routers help in _______.

(a) transmission of data between networks

(b) connecting different devices using appropriate protocol

(c) both a & b

(d) neither a nor b

Ans. c

 

166. A network connection requires ________ important components to connect to each other.

(a) IP address

(b) Port number

(c) both a & b

(d) none of them

Ans. c

 

167. IP address helps to ______ a computer connected to a network.

(a) uniquely identify

(b) format

(c) reset

(d) reject

Ans. a

 

168. Port number on a computer host connected to a network denotes a ______.

(a) background server program

(b) client program

(c) both a & b

(d) none of them

Ans. c

 

169. A program which runs in the background and sends results requested by a client is called a .

(a) server

(b) client

(c) port

(d) IP address

Ans. a

 

170. A program which runs in the foreground, communicates with server and displays results sent by the server is called a ______.

(a) server

(b) client

(c) port

(d) IP address

Ans. b

 

171. Computers connected to a network without any client or server system (all hosts are equally equally important) are in _______ network.

(a) client server

(b) peer to peer

(c) firewall

(d) proxy server

Ans. b

P a g e | 260

 

 

172. The intermediary host which communicates with the clients on behalf of a another server is called ______.

(a) proxy server

(b) firewall

(c) ethernet

(d) WiFi

Ans. a

 

173. The intermediary host which protects a network from any communication with prohibited hosts outside the protected network is called ______.

(a) proxy server

(b) firewall

(c) ethernet

(d) WiFi

Ans. b

 

174. Firewall can______ .

(a) deny access to specific sites

(b) allow access to only white listed sites

(c) both a & b

(d) none of them

Ans. c

 

175. A proxy server which simply forwards messages from one network to another network is called ________ proxy.

(a) gateway/ tunneling

(b) forward proxy

(c) reverse proxy

(d) all of them

Ans. a

 

176. A proxy server which communicates with the Internet and retrieves data from the Internet is called _______ proxy.

(a) gateway/ tunneling

(b) forward proxy

(c) reverse proxy

(d) all of them

Ans. b

 

177. A proxy server which communicates with the servers in a local network (for services like decryption, authentication, etc.) is called ______ proxy.

(a) gateway/ tunneling

(b) forward proxy

(c) reverse proxy

(d) all of them

Ans. c

 

178. Firewall can be implemented through ________.

(a) hardware

(b) software

 (c) both a & b

(d) none of them

Ans. c

 

179. The design adopted for connecting several hosts on a network is called______ .

(a) telephony

(b) wiring

(c) connection

(d) topology

Ans. d

 

180. When 2 devices are connected through a dedicated line, it is _____ topology.

(a) point to point

(b) bus

(c) star

(d) ring

Ans. a

 

181. When all nodes are connected to a central hub, it is_____ topology. (a) point to point (b) bus (c) star (d) ring Ans. c 182. When all nodes are connected in a circular form (the first node becomes the last node), it is _______ topology. (a) point to point (b) bus (c) star (d) ring Ans. d P a g e | 261

183. When each host has a dedicated line connected to any other host on the network, it is _______ topology.

 (a) fully connected

(b) Daisy chain

(c) tree

(d) partly connected

Ans. a

 

184. When each host has a dedicated line connected to any other host on the network, it is ______ topology.

(a) fully connected

(b) daisy chain

(c) tree

(d) partly connected

Ans. a

 

185. When computers are connected in chain (from one host to another) and data hops between hosts till it reaches the intended host, it is______ topology.

(a) fully connected

(b) daisy chain

(c) tree

(d) partly connected

Ans. b

 

186. When data travels in branching connections to reach intended host, the network topology is called _______ .

(a) fully connected

(b) daisy chain

(c) tree

(d) partly connected

Ans. c

 

187. When hosts are connected in a part fully connected manner (with many missing connections), it is _______ topology.

(a) fully connected

(b) daisy chain

(c) tree

(d) partly connected

Ans. d

 

188. Usually, the network connecting hosts inside a single building is called______.

(a) LAN

(b) WAN

(c) MAN

(d) none of them

Ans. a

 

189. Usually, the network connecting hosts inside a city/ metropoliton limit is called______.

(a) LAN

(b) WAN

(c) MAN

(d) none of them

Ans. c

 

190. Usually, the network connecting hosts located in several cities or nations is called ______.

(a) LAN

(b) WAN

(c) MAN

(d) none of them

Ans. b

 

191. When network hosts are connected without wires,_______ protocol is used.

(a) LAN

(b) WAN

(c) MAN

(d) WLAN

Ans. d

192. MODEM is a device used for converting______.

(a) digital signal to analog

 (b) analog signal to digital

(c) both a & b

(d) neither a nor b

Ans. c

 

193. MODEM is used to convey data over ________.

(a) air

(b) telephone line

(c) train track

(d) bus route

Ans. b

P a g e | 262

 

 

194. Hub is _______to switch/ bridge since it repeats data even to the unwanted connections.

(a) inferior

(b) superior

(c) equivalent

(d) none of them

Ans. a

195. The networking device which receives a packet and repeats it to just the intended recipient lines is called a ________.

(a) hub

(b) switch

(c) MODEM

(d) none of them

Ans. b

 

196. Switch is_______ to a hub since unwanted repetitions are curtailed.

(a) inferior

(b) superior

 (c) equivalent

(d) none of them

Ans. b

 

197. The device used to transfer data from one network to another network on the Internet is called

(a) hub

(b) switch

(c) MODEM

(d) router

Ans. d

 

198. The device which connects one Local Area Network to another Local Area Network is called

(a) hub

(b) switch

(c) MODEM

(d) bridge

Ans. d

 

199 . The node which connects one large network (a WAN, MAN, etc.) to another large network is called ______ .

(a) hub

(b) switch

(c) gateway

(d) MODEM

Ans. c

 

200. The cable containing 4 pairs of twisted wires without any shielding foil for data transmission is called ______ .

(a) unshielded twisted cable

(b) shielded twisted cable

(c) coaxial cable

(d) fibre optic cable

Ans. a

 

201. The cable containing 4 pairs of twisted wires with shielding foil to control interference with other electrical signals and used for data transmission is called______.

(a) unshielded twisted cable

(b) shielded twisted cable

(c) coaxial cable

(d) fibre optic cable

Ans. b

 

202. A cable with single copper core and braided metal shield is called_____ .

(a) unshielded twisted cable

(b) shielded twisted cable

(c) coaxial cable

(d) fibre optic cable

Ans. c

 

203. A cable with single fibre optic core line surrounded by several layers of protective materials is called _____ .

(a) unshielded twisted cable

(b) shielded twisted cable

(c) coaxial cable

(d) fibre optic cable

Ans. d

P a g e | 263

 

 

204. Fibre optic cables are _______ interferences from electric cables and electromagnetic waves.

(a) prone to

(b) unaffected by

(c) susceptible to

(d) affected by

Ans. b

205. Out of the several cable options, ________ cable provides high speed over long distances without being affected by local interferences.

(a) fibre optic

(b) unshielded twisted pair

(c) shielded twisted pair

(d) none of them

Ans. a

206. Wireless networks communicate using _______ signal instead of cables.

(a) infrared

(b) low frequency radio wave

(c) Wireless Fidelity (WiFi - IEEE 802.11 standard)

(d) all of them

Ans. d

 

207. In the modern days, _______ is the best choice for wireless networking.

(a) WiFi

(b) infrared

(c) radio waves

(d) micro-wave

Ans. a

 

208. The WiFi standard which permits transmission distance of 50m with data rate of 54MBPS is__

(a) IEEE 802.11a

(b) IEEE 802.11b

(c) IEEE 802.11g

(d) IEEE 802.11n

Ans. a

 

209. The WiFi standard which permits transmission distance of 100m with data rate of 11MBPS is_

(a) IEEE 802.11a

(b) IEEE 802.11b

(c) IEEE 802.11g

(d) IEEE 802.11n

Ans. b

 

210. The WiFi standard which permits transmission distance of 100m with data rate of 54MBPS is_

(a) IEEE 802.11a

(b) IEEE 802.11b

(c) IEEE 802.11g

(d) IEEE 802.11n

Ans. c

 

211. The WiFi standard which permits transmission distance of more than 100m with data rate of 100MBPS is ______

(a) IEEE 802.11a

(b) IEEE 802.11b

(c) IEEE 802.11g

(d) IEEE 802.11n

Ans. d

 

212. Wireless networks are _______wired networks.

(a) slower than

(b) faster than

(c) as fast as

(d) none of them

Ans. a

 

213. In terms of data safety, wireless networks are______ wired networks.

(a) more secure than

(b) less secure than

(c) as safe as

(d) none of them

Ans. b

P a g e | 264

214. Normally, WiFi signal reach _______m distance.

(a) 50 to 100m

(b) 1 to 2m

(c) 0.5 to 1.0m

(d) 2 to 3m

Ans. a

 

215. WiFi networks have ________for connecting.

(a) name

(b) password

(c) both a & b

(d) none of them

Ans. c

 

216. Name of a WiFi network may be_______.

(a) visible

(b) invisible

(c) both a & b

(d) none of them

Ans. c

 

217. Open WiFi networks have_______ .

(a) a visible name

(b) no password

(c) visible name without any password

(d) none of them

Ans. d

 

218. The technology which permits data transmission between devices like computers, mobile phones, tablets, headsets, etc. is called ______

(a) Bluetooth

(b) coaxial cable

(c) fibre optic cable

(d) twisted pair cable

Ans. a

219. The network established using Bluetooth technology is called a ______.

(a) Local Area Network (LAN)

(b) Wide Area Network (WAN)

(c) Metropolitan Area Network (MAN)

(d) Personal Area Network (PAN)

Ans. d

 

220. Bluetooth permits_____ .

(a) pairing by acceptance

(b) pairing by password authentication

(c) pairing by verification

(d) all of them

Ans. d

 

221. The fifth layer of the OSI model is _____layer and it controls connection between 2 hosts (like client and server) during data communication.

(a) session

(b) presentation

(c) application

(d) transport

Ans. a

 

222. The sixth layer of the OSI model is _______ layer and it takes care of encryption, decryption, compression, decompression and data encoding.

(a) session

(b) presentation

(c) application

(d) transport

Ans. b

 

223. The seventh layer of the OSI model is _____layer and it deals with file sharing, video sharing, audio sharing, browsing, etc. using specific programs.

(a) session

(b) presentation

(c) application

(d) transport

Ans. c

P a g e | 265

 

 

224. UDP stands for _____.

(a) Unified Datagram Protocol

(b) User Datagram Protocol

(c) User Datagram Procedure

(d) User Digital Protocol

Ans. b

 

225. _______ allows for mapping IP address to an ethernet or hardware address.

(a) Address Resolution Protocol (ARP)

(b) Reverse Address Resolution Protocol (RARP)

(c) Open System Interconnection (OSI)

(d) none of them

Ans. a

 

226. ______ is the version of Internet Protocol now being phased out.

(a) IP version 1 (IPV1)

(b) IP version 2 (IPV2)

(c) IP version 4 (IPV4)

(d) IP version 6 (IPV6)

Ans. c

 

227. _____is the version of Internet Protocol now being introduced to handle increased size of the Internet.

(a) IP version 1 (IPV1)

(b) IP version 2 (IPV2)

(c) IP version 4 (IPV4)

(d) IP version 6 (IPV6)

Ans. d

 

228. IPV4 addresses have a ______ by numeric address.

(a) 4

(b) 6

(c) 8

(d) 16

Ans. a

 

229. The addresses 216.58.213.36 (www.google.com), 209.191.88.254 (www.yahoo.com) belong to IP version ______.

(a) 1

(b) 2

(c) 3

(d) 4

Ans. d

 

230. In a client server network, the ports in the range of 0 to 1023 are called ______ ports.

(a) relational ports

(b) general ports

(c) well known ports

(d) user ports

Ans. c

 

231. Network protocols are standardized through______ .

(a) Request For Comment (RFC)

(b) email

(c) web server

(d) telnet

Ans. a

 

232. RFC in networking stands for _____.

(a) Rejection For Comment

(b) Request For Comment

(c) Request For Contest

(d) Request Freight Comment

Ans. b

 

233. TCP/IP port number 7 is assigned for ______ protocol.

(a) daytime

(b) echo

(c) quote of the day

(d) message send

Ans. b

 

234. TCP/IP port number 13 is assigned for ______ protocol.

(a) daytime

(b) echo

(c) quote of the day

(d) message send

Ans. a

P a g e | 266

235. TCP/IP port number 17 is assigned for protocol.

(a) daytime

(b) echo

(c) quote of the day

(d) message send

Ans. c

236. TCP/IP port number 18 is assigned for protocol.

(a) daytime

(b) echo

(c) quote of the day

(d) message send

Ans. d

 

237. TCP/IP port number 20 is assigned for______.

(a) Telnet

(b) Simple Mail Transfer Protocol (SMTP)

(c) File Transfer Protocol Protocol (FTP)

(d) Trivial File Transfer Protocol (TFTP)

Ans. c

 

238. TCP/IP port number 23 is assigned for______.

(a) Telnet

(b) Simple Mail Transfer Protocol (SMTP)

(c) File Transfer Protocol Protocol (FTP)

(d) Trivial File Transfer Protocol (TFTP)

Ans. a

 

239. TCP/IP port number 25 is assigned for______.

(a) Telnet

(b) Simple Mail Transfer Protocol (SMTP)

(c) File Transfer Protocol Protocol (FTP)

(d) Trivial File Transfer Protocol (TFTP)

Ans. b

 

240. TCP/IP port number 69 is assigned for _______.

(a) Telnet

(b) Simple Mail Transfer Protocol (SMTP)

(c) File Transfer Protocol Protocol (FTP)

(d) Trivial File Transfer Protocol (TFTP)

Ans. d

 

241. TCP/IP port number 80 is assigned for_______.

(a) Hyper Text Transfer Protocol (HTTP)

(b) Post Office Protocol (POP)

(c) Structured Query Language (SQL)

(d) Network News Transfer Protocol (NNTP)

Ans. a

 

242. TCP/IP port number 109 is assigned for _______.

(a) Hyper Text Transfer Protocol (HTTP)

(b) Post Office Protocol (POP)

(c) Structured Query Language (SQL)

(d) Network News Transfer Protocol (NNTP)

Ans. b

 

243. TCP/IP port number 118/ 156 is assigned for ______.

(a) Hyper Text Transfer Protocol (HTTP)

(b) Post Office Protocol (POP)

(c) Structured Query Language (SQL) (d) Network News Transfer Protocol (NNTP)

Ans. c

P a g e | 267

 

 

244. TCP/IP port number 119/ 443 is assigned for ______.

(a) Hyper Text Transfer Protocol (HTTP)

(b) Post Office Protocol (POP)

(c) Structured Query Language (SQL)

(d) Network News Transfer Protocol (NNTP)

Ans. d

 

245. TCP/IP port number 143/ 220 is assigned for ______ .

(a) Internet Message Access Protocol (IMAP)

(b) Simple Network Management Protocol (SNMP)

(c) Internet Relay Chat (IRC)

(d) Precision Time Protocol (PTP)

Ans. a

 

246. TCP/IP port number 161 is assigned for ______.

(a) Internet Message Access Protocol (IMAP)

(b) Simple Network Management Protocol (SNMP)

(c) Internet Relay Chat (IRC)

(d) Precision Time Protocol (PTP)

Ans. b

 

247. TCP/IP port number 443 is assigned for _______.

(a) HTTP over Secure Socket Layer HTTPS

(b) Remote Procedure Call (RPC)

(c) Dynamic Host Configuration Protocol (DHCP)

(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)

Ans. a

 

248. TCP/IP port number 530 is assigned for _______.

(a) HTTP over Secure Socket Layer HTTPS

(b) Remote Procedure Call (RPC)

(c) Dynamic Host Configuration Protocol (DHCP)

(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)

Ans. b

 

249. TCP/IP port number 546/ 547 is assigned for______ .

(a) HTTP over Secure Socket Layer HTTPS

(b) Remote Procedure Call (RPC)

(c) Dynamic Host Configuration Protocol (DHCP)

(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)

Ans. c

 

250. TCP/IP port number 993 is assigned for ______.

(a) HTTP over Secure Socket Layer HTTPS

(b) Remote Procedure Call (RPC)

(c) Dynamic Host Configuration Protocol (DHCP)

(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)

Ans. d

 

251. FTP runs on port number ______.

(a) 7

(b) 13

(c) 20

(d) 23

Ans. c

P a g e | 268

 

 

252. The FTP server which does not require login process is called______ .

(a) Hyper Text Transmission Protocol

(b) Simple Mail Transfer Protocol

(c) Network Time Protocol

(d) Anonymous File Transfer Protocol

Ans. d

 

253. Using FTP, a file can be copied from remote system to the local system using the command .

(a) get

(b) put

(c) cd

(d) lcd

Ans. a

 

254. Using FTP, a file can be copied from local host to remote host using the command ______.

(a) get

(b) put

(c) cd

(d) lcd

Ans. b

 

255. Using FTP, working directory on the remote host can be changed using the command_____ .

(a) pwd

(b) put

(c) cd

(d) lcd

Ans. c

 

256. Using FTP, working directory on the local host can be changed using the command______ .

(a) pwd

(b) bye

(c) cd

(d) lcd

Ans. d

 

257. Using FTP, list of files on the remote host can be viewed using the command______.

(a) pwd

(b) bye

(c) cd

(d) lcd

Ans. a

 

258. Using FTP, a file on the remote host may be deleted using the command______.

(a) delete

(b) bye

(c) cd

(d) lcd

Ans. a

 

259. Using FTP, connection to remote FTP server may be terminated using the command______ .

(a) delete

(b) bye/ quit

(c) cd

(d) lcd

Ans. b

 

260. Popular FTP clients are .

(a) CoreFTP

(b) FireFTP

(c) FileZilla

(d) all of them

Ans. d

 

261. The network protocol which permits a person to login to a remote computer, access files, execute commands on the remote computer, etc. is called ______

(a) FTP

(b) HTTP

(c) Telnet

(d) SMTP

Ans. c

 

262. Port No._____ is reserved for telnet protocol.

(a) 7

(b) 13

(c) 20

(d) 23

Ans. d

 

263. Usually, telnet connection is established using ______command followed by name of host.

(a) ftp

(b) telnet

(c) ping

(d) ls

Ans. b

P a g e | 269

 

 

264. The address of the physical networking component (like ethernet, WiFi, etc.) is called ______ address.

(a) virtual

(b) logical

(c) physical

(d) imaginary

Ans. c

 

265. The address assigned to a host on getting connected to a network (like the Internet) is called ______ address.

(a) virtual

(b) logical

(c) physical

(d) imaginary

Ans. b

 

266. In networking, MAC stands for _____.

(a) Media Address Control

(b) Machine Access Control

(c) Media Access Contact

(d) Media Access Control

Ans. d

 

267. Logical address of a host connected to a network is otherwise called _____ address.

(a) IP address

(b) IP version 4 address

(c) IP version 6 address

(d) all of them

Ans. d

 

268. The addresses of class A network has subnet mask of ______.

(a) 255.0.0.0

(b) 255.255.0.0

(c) 255.255.255.0

(d) none of them

Ans. a

 

269. The addresses of class B network has subnet mask of ______.

 (a) 255.0.0.0

(b) 255.255.0.0

(c) 255.255.255.0

 (d) none of them

 Ans. B

 270.The addresses of class C network has subnet mask of ______ .

(a) 255.0.0.0

(b) 255.255.0.0

 (c) 255.255.255.0

 (d) none of them

 Ans. C

 271. First byte of class A network is in the range of _______.

 (a) 1 - 126

(b) 128 – 191

(c) 192 - 223

(d) none of them

 Ans. A

 272. First byte of class B network is in the range of ______.

 (a) 1 - 126

(b) 128 – 191

(c) 192 - 223

(d) none of them

 Ans. B

 273. First byte of class C network is in the range of _____.

(a) 1 - 126

(b) 128 – 191

(c) 192 - 223

(d) none of them

 Ans. C

 274. Each class A network supports ______hosts.

 (a) 1,67,77,214

 (b) 65,534

(c) 254

(d) none of them

 Ans. A

 275. Each class B network supports _______ hosts.

 (a) 1,67,77,214

 (b) 65,534

 (c) 254

 (d) none of them

 Ans. b

P a g e | 270

276. Each class C network supports _______hosts.

 (a) 1,67,77,214

(b) 65,534

(c) 254

 (d) none of them

 Ans. C

 277. IPV4 has got_______ bits for addressing of hosts.

 (a) 128

 (b) 64

 (c) 32

(d) 16

 Ans. C

 278. The TCP/IP protocol which permits sharing of large files over the Internet is called ______ .

 (a) File Transfer Protocol (FTP)

 (b) Hyper Text Transmission Protocol (HTTP)

 (c) Simple Mail Transfer Protocol (SMTP)

 (d) Network Time Protocol (NTP)

Ans. A

 279. IPV6 has got _____bits for addressing of hosts.

 (a) 128

(b) 64

(c) 32

 (d) 16

 Ans. A

 280. IPV4 has got _____ bytes for addressing of hosts.

(a) 16

(b) 8

 (c) 4

 (d) 2

 Ans. C

 281. IPV6 has got ______bytes for addressing of hosts.

 (a) 16

 (b) 8

 (c) 4

(d) 2

 Ans. a

282. What are Protocols?

 Ans. Agreements on how communication components and DTE

283. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10 Mbps half-duplex as well. How much bandwidth does each host have to the server?

 Ans. 10Mbps

284. NFC stands for________

a) Near field communication

b) New field communication

c) Near firm communication

 d) Near Field Camera

 Ans. A

 285. VPN stands for________.

 a) vita power nation

b) virtual private network

c) very powerful network

d) very powerful nation

Ans. B

 286. Father of networking ________

a) ray noorda

b) jef bejos

c) stan lee

d) tim berners lee

 Ans. a

P a g e | 271

287. when data transfer only one direction is called ______.

 a) Half duplex

 b) simplex

 c) full duplex

 d) communication

 Ans. b

288. Bus topology is also called __________.

a) line topology

b) linear topology

 c) star topology

 d) Both A and B

 Ans. D

 289. Which topology use in LAN ?

 a) BUS/Horizontal Topology

 b) Hybrid

 Ans. A

290. In computer network the central computer is called ______.

a) server

 b) router

Ans. A

 291. Each IP Packet must contain __________

a) Source and Destination address

b) Destination Address only

Ans. A

 292.Which of the following cable transmits messages in the form of light waves?

A) STP cable

B )UTP cable

C) Co-axial cable

D) Optical fibre cable

 Ans. D

 293. The systematic design (like radial, ring, etc.) of connecting computers in a network is called network _______.

(a) topology

(b) protocol

 (c) firewall

 (d) antivirus

Ans. a

294. WLAN stands for______ .

 (a) Wireless Local Area Network

 (b) Wired Local Area Network

 (c) Wireless Local Area Number

 (d) Wireless Local Arithmatic Network

 Ans. A

 295. The device which repeats a signal on all lines except incoming one is called _______.

(a) hub

 (b) switch

 (c) MODEM

(d) router

 Ans. a

296. Bluetooth signals have a range of ________.

(a) 1m

(b) 5m

(c) 10m

(d) 100m

 Ans. C

 297. W3C in networking stands for ______.

(a) World Wide Winter Consortium

(b) World Wide Web Contest

 (c) World White Web Consortium

(d) World Wide Web Consortium

Ans. d

No comments:

Post a Comment