MCQs System & Network Admin
MCQs System & Network Admin
« Prev
Next »
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “IP Address”.
9. The design of the Internet protocol suites adhere to the ________ principle.
a) Data corruption
b) Connection oriented
c) End to End principle
d) Reliability
View Answer
Answer: c
Explanation: The design of the Internet protocol suite adheres to the end to end principle, a
concept adapted from the CYCLADES project. Under the end to end principle, the network
infrastructure is considered inherently unreliable at any signal network element or
transmission medium and is dynamic in terms of availability of links and notes.
8. Central software management server communicates with the gateway devices in which
approach?
a) Factory Bootstrap
b) Server limited Bootstrap
c) Client Initiated Bootstrap
d) Bootstrap
View Answer
Answer: b
Explanation: In server initiated bootstrap, the central software management server
communicates with the gateway device and deploys the proper version of the software to it.
9. Which mode assumes that it is the gateway’s responsibility to connect to the central
repository server?
a) Factory Bootstrap
b) Server limited Bootstrap
c) Client Initiated Bootstrap
d) Bootstrap
View Answer
Answer: c
Explanation: Client initiated bootstrap mode assumes that it is the gateway’s responsibility
to connect to the central repository server and download the proper version of the software.
In this scenario, the gateway is required to have lightweight bootstrap software installed so
it can communicate with the software management server.
10. The feature of IoT Gateway is the ability to download updates over-the-air.
a) True
b) False
View Answer
Answer: a
Explanation: One important extremely feature of IoT Gateway is the ability to download
updates over-the-air.
13. Grid system and responsive design come standard with __________ pixel wide grid
layout.
a) 1270
b) 1500
c) 1170
d) 1350
View Answer
Answer: c
Explanation: Grid system and responsive design come standard with 1170 pixel wide grid
layout. Alternatively, the developer can use a variable width layout.
14. ___________ provides a set of stylesheets that provide basic style definition for HTML
components.
a) Bootstrap
b) Javascript
c) Sass
d) Flexbox
View Answer
Answer: a
Explanation: Bootstrap provides a set of stylesheets that provide basic style definition for
HTML components. These provide a uniform, modern appearance for formatting text, tables
and form elements.
1. Which of the following is the broadcast address for a Class B network ID using the default
subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
View Answer
Answer: c
Explanation: In this case, the class B network ID is 172.16.0.0. We know that the default
mask of a class B network is 255.255.0.0. If we OR any address in a network with the
complement of the default mask (0.0.255.255), we get the broadcast address of the
network. In this case, the result of OR would be 172.16.255.255.
3. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would
you use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: c
Explanation: If you have eight networks and each requires 10 hosts, you would use the
Class C mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which means
you have four subnet bits and four host bits. Using our math, we’d get the following:
24-2=14 subnets
24-2=14 hosts.
4. The combination of _________ and __________ is often termed the local address of the
local portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number
View Answer
Answer: c
Explanation: It is termed as the local address because the address won’t be applicable
outside the subnet. Sub networking is implemented for remote sensing in transparent way
from that host which is contained in the sub network which called a local operation.
5. _________ implies that all subnets obtained from the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Dynamic length subnetting
View Answer
Answer: a
Explanation: Static subnetting is used when the requirement is of same number of hosts in
each subnet for the institution. The same subnet mask can be used to find the subnet id of
each subnet. It is usually used to divide large networks into smaller parts.
7. __________ is a high performance fiber optic token ring LAN running at 100 Mbps over
distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
View Answer
Answer: a
Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of standards for
fiber optic token ring LANs running at 100 Mbps over distances up to 200 km in diameter
and 1000 stations connected.
8. Which of the following are Gigabit Ethernets?
a) 1000 BASE-SX
b) 1000 BASE-LX
c) 1000 BASE-CX
d) All of the mentioned
View Answer
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing
various technologies for transmitting Ethernet frames at a rate of a gigabit per second
(1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into
use beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a
result of being considerably faster.
9. _________ is a collective term for a number of Ethernet Standards that carry traffic at the
nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) Gigabyte Ethernet
View Answer
Answer: b
Explanation: Fast Ethernet is a set of Ethernet Standards which were introduced in 1995,
that carry traffic at the nominal rate of 1000 Mbit/s. 100BASE-TX is the most commonly
used Fast Ethernet standard.
10. _________ is another kind of fiber optic network with an active star for switching.
a) S/NET
b) SW/NET
c) NET/SW
d) FS/NET
View Answer
Answer: a
Explanation: A 50-MBd active star fiber optical Local area network (LAN) and its optical
combiner and mixing rod splitter are presented. The limited power budget and relatively
large tapping losses of light wave technology, which limit the use of fiber optics in tapped
bus LAN topologies, are examined and proven tolerable in optical star topologies.
a) i only
b) ii only
c) iii and iv only
d) i and v only
View Answer
Answer: d
Explanation: First, if you have two hosts directly connected, as shown in the graphic, then
you need a crossover cable. A straight-through cable won’t work. Second, the hosts have
different masks, which puts them in different subnets. The easy solution is just to set both
masks to 255.255.255.0 (/24).
2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the
following can be valid host IDs on the LAN interface attached to the router?
i. 172.16.1.100
ii. 172.16.1.198
iii. 172.16.2.255
iv. 172.16.3.0
a) i only
b) ii and iii only
c) iii and iv only
d) ii only
View Answer
Answer: c
Explanation: The router’s IP address on the E0 interface is 172.16.2.1/23, which is
255.255.254.0. This makes the third octet a block size of 2. The router’s interface is in the
172.16.2.0 subnet, and the broadcast address is 172.16.3.255 because the next subnet is
172.16.4.0. The valid host range is 172.16.2.1 to 172.16.3.254. The router is using the first
valid host address in the range.
iii. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
a) i and iii
b) ii and iv
c) i, ii and iv
d) ii, iii and iv
View Answer
Answer: b
Explanation: The mask 255.255.254.0 (/23) used with a Class A address means that there
are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254). So this
makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host
10.16.3.65 is in the 10.16.2.0 subnet. The next subnet is 10.16.4.0, so the broadcast
address for the 10.16.2.0 subnet is 10.16.3.255. The valid host addresses are 10.16.2.1 to
10.16.3.254.
4. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
a) 14
b) 15
c) 16
d) 30
View Answer
Answer: d
Explanation: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets,
each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network
address? Not at all. The number of host bits would never change.
5. You need to subnet a network into 5 subnets, each with at least 16 hosts. Which classful
subnet mask would you use?
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: b
Explanation: You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240
provides 16 subnets with 14 hosts which is less than 15, so this will not work. The mask
255.255.255.224 provides 8 subnets, each with 30 hosts so this may work. The mask
255.255.255.192 provides 4 subnets, each with 60 hosts so this may work. Comparing both
the possible masks, 255.255.255.224 provides the best answer.
6. You have a network that needs 29 subnets while maximizing the number of host
addresses available on each subnet. How many bits must you borrow from the host field to
provide the correct subnet mask?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: d
Explanation: A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We
need more subnets, so let’s add subnet bits. One more subnet bit would be a 248 mask.
This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the
best answer.
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP addresses on the LAN attached to the router
interface?
a) 6
b) 8
c) 30
d) 32
View Answer
Answer: a
Explanation: A /29 (255.255.255.248), regardless of the class of address, has only 3 host
bits. Six hosts are the maximum number of hosts on this LAN, including the router interface.
Out of the 8 addresses possible with the host bits, the first and the last address are for the
subnet id and broadcast address respectively.
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
a) 7 subnets, 30 hosts each
b) 8 subnets, 8,190 hosts each
c) 8 subnets, 2,046 hosts each
d) 7 subnets, 2,046 hosts each
View Answer
Answer: b
Explanation: A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is
only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
1. Which type of Ethernet framing is used for TCP/IP and DEC net?
a) Ethernet 802.3
b) Ethernet 802.2
c) Ethernet II
d) Ethernet SNAP
View Answer
Answer: c
Explanation: The Ethernet 802.3 framing is used for NetWare versions 2 to 3.11, and the
Ethernet 802.2 framing is used for NetWare versions 3.12 and later plus OSI routing,
Ethernet II is used with TCP/IP and DEC net, and Ethernet SNAP is used with TCP/IP and
AppleTalk. The type field in Ethernet 802.2 frame is replaced by a length field in Ethernet
802.3.
2. Consider a situation in which you are a system administrator on a NetWare network, you
are running NetWare 4.11 and you cannot communicate with your router. What is the likely
problem?
a) NetWare 4.11 defaults to 802.2 encapsulation
b) NetWare 4.11 defaults to 802.3 encapsulation
c) Cisco routers only work with NetWare 3.11
d) NetWare 3.11 defaults to 802.2 encapsulation
View Answer
Answer: a
Explanation: The default encapsulation on Cisco routers is Novell Ethernet_802.3 and
NetWare 3.12and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3.
3. NetWare IPX addressing uses a network number and a node number. Which statement
is not true?
a) The network address is administratively assigned and can be up to 16 hexadecimal digits
long
b) The node address is always administratively assigned
c) The node address is usually the MAC address
d) If the MAC address is used as the node address, then IPX eliminates the use of ARP
View Answer
Answer: b
Explanation: The network address can be up to 16 hexadecimal digits in length. The node
number is 12 hexadecimal digits. The node address is usually the MAC address. An
example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is
0000.0c56.de33. The network number is assigned by the system administrator of the Novell
network and the MAC address/node address is not assigned by the administrator.
4. Which NetWare protocol works on layer 3–network layer—of the OSI model?
a) IPX
b) NCP
c) SPX
d) NetBIOS
View Answer
Answer: a
Explanation: IPX (Internetwork Packet Exchange) is the NetWare network layer 3 protocol
used for transferring information on LANs that use Novell’s NetWare.
6. As a system administrator, you want to debug IGRP but are worried that the “debug IP
IGRP transaction” command will flood the console. What is the command that you should
use?
a) Debug IP IGRP event
b) Debug IP IGRP-events
c) Debug IP IGRP summary
d) Debug IP IGRP events
View Answer
Answer: d
Explanation: The “debug IP IGRP events” is used to display a short summary of IGRP
routing information. You can append an IP address onto either console’s command-line to
see only the IGRP updates from a neighbor. The command will only give a short summary
and hence won’t flood the command line.
7. What does the following series of commands “Router IGRP 71 network” accomplish?
10.0.0.0 router IGRP 109 network 172.68.7.0
a) It isolates networks 10.0.0.0 and 172.68.7.0
b) It loads IGRP for networks 109 and 71
c) It disables RIP
d) It disables all routing protocols
View Answer
Answer: a
Explanation: It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous
systems 109 and71 with IGRP. IGRP does not disable RIP, both can be used at the same
time.
8. The “IPX delay number” command will allow an administrator to change the default
settings. What are the default settings?
a) For LAN interfaces, one tick; for WAN interfaces, six ticks
b) For LAN interfaces, six ticks; for WAN interfaces, one tick
c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
View Answer
Answer: a
Explanation: Tick is basically the update rate of clients in the network. The IPX delay
number will give the ticks at a certain time. The default ticks are–for LAN interfaces, one
tick, and for WAN interfaces, six ticks.
9. As a system administrator, you need to set up one Ethernet interface on the Cisco router
to allow for both sap and Novell-ether encapsulations. Which set of commands will
accomplish this?
a) Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX network 6c
b) Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0 IPX encapsulation sap IPX network 6c
c) Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX
encapsulation sap
d) Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX encapsulation sap IPX network 6c
View Answer
Answer: d
Explanation: The following commands setup the sub interfaces to allow for two types of
encapsulation:interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e
interface Ethernet0.2 IPX encapsulation sap IPX network 6c.
10. What does the “IPX maximum-paths 2” command accomplish?
a) It enables load sharing on 2 paths if the paths are equal metric paths
b) It sets up routing to go to network 2
c) It is the default for Cisco IPX load sharing
d) It enables load sharing on 2 paths if the paths are unequal metric paths
View Answer
Answer: a
Explanation: It enables load sharing on 2 paths if the paths are equal metric paths. The
default is 1 path and the maximum is 512 paths. The value must always be greater than 1
and must be a natural number.
11. You want to enable both arpa and snap encapsulation on one router interface. How do
you do this?
a) The interface can handle multiple encapsulation types with no extra configuration
b) Assign two network numbers, one for each encapsulation type
c) Enable Novell-ether to run multiple encapsulation types
d) Both arpa and snap are enabled by default so you don’t have to configure anything
View Answer
Answer: b
Explanation: To assign multiple network numbers, you usually use sub interfaces. A sample
configuration follows: IPXEthernet 0.1 IPX encapsulation novell-ether ipx network 9e
interface ethernet 0.2 ipx encapsulation sap ipx network 6c
13. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do
not forward them. How are services advertised to other networks?
a) Each router builds its own SAP table and forwards that every 60 seconds
b) Each router assigns a service number and broadcasts that
c) SAPs aren’t necessary with Cisco routers
d) Cisco routers filter out all SAPs
View Answer
Answer: a
Explanation: Cisco routers build SAP tables and forward the table every 60 seconds. All
SAPs can’t befiltered even with 4.x since NDS and time synchronization uses SAPs.
14. Novell’s implementation of RIP updates routing tables every _________ seconds.
a) 60
b) 90
c) 10
d) 30
View Answer
Answer: a
Explanation: Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every
10 seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan
VINES signals every 90 seconds.
15. In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the
correct metrics.
a) Ticks & Hops
b) Hops & Loops
c) Loops & Counts
d) Counts & Ticks
View Answer
Answer: a
Explanation: It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops
are equal, then it uses an administratively assigned tiebreaker.
1. Multiple objects can be sent over a TCP connection between client and server in a
persistent HTTP connection.
a) True
b) False
View Answer
Answer: a
Explanation: Persistent connections are kept active after completing transaction so that
multiple objects can be sent over the same TCP connection.
7. In FTP protocol, a client contacts a server using ______ as the transport protocol.
a) Transmission control protocol
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol
View Answer
Answer: a
Explanation: The clients use the Transmission Control Protocol for FTP as it’s more reliable
than UDP, DCCP, and SCTP, and reliability of file transfer is required to be as high as
possible for FTP.
8. In Active mode FTP, the client initiates both the control and data connections.
a) True
b) False
View Answer
Answer: b
Explanation: In Passive mode of FTP, the client initiates both data and control connections,
while in Active mode, the client initiates the control connection and then the server initiates
the data connection.
10. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
View Answer
Answer: c
Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the
valid credentials from a victim by spoofing the intended resource, and tricking the victim to
give his/her valid authorization credentials.
3. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
View Answer
Answer: a
Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a UNIX workstation,
or a combination of these that determines which information or services can be accessed
from the outside and who is permitted to use the information and services from outside.
Generally, a firewall is installed at the point where the secure internal network and untrusted
external network meet, which is also known as a chokepoint.
8. What tells a firewall how to reassemble a data stream that has been divided into
packets?
a) The source routing feature
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
View Answer
Answer: a
Explanation: The source routing feature provides a path address for the packet to help the
firewall to reassemble the data stream that was divided into packets. After reassembling,
the firewall can then filter the stream.
10. A firewall needs to be __________ so that it can grow proportionally with the network
that it protects.
a) Robust
b) Expansive
c) Fast
d) Scalable
View Answer
Answer: b
Explanation: The firewall has to be expansive because a network is expected to grow with
time and if the firewall is unable to grow with it, the firewall won’t be able to handle the
growing network traffic flow and will hence fail.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) interconnection of wide area networks
View Answer
Answer: b
Explanation: Internet is nothing but an interconnected computer network providing a variety
of communication facilities, consisting of a huge amount of small networks using
standardized communication protocols.
3. Internet access by transmitting digital data over the wires of a local telephone network is
provided by _______
a) leased line
b) digital subscriber line
c) digital signal line
d) digital leased line
View Answer
Answer: b
Explanation: DSL (Digital Subscriber Line) is the technology designed to use the existing
telephone lines to transport high-bandwidth data to service subscribers. DSL was used to
allow the early users access to the internet and it provides dedicated, point-to-point, public
network access.
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) local procedure call
View Answer
Answer: c
Explanation: Resource reservation protocol is a transport layer protocol used on the
internet. It operates over IPv4 and IPv6 and is designed to reserve resources required by
the network layer protocols.
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) packet switching
View Answer
Answer: d
Explanation: Packet switching is not really related to media access control as it just features
delivery of packets of data between devices over a shared network. Internet is actually
based on packet switching.
40. The GPMC combines the functionality of the ACL Editor, Delegation Wizard, and
Resultant Set of the Policy tool.
A. True
B. False
Ans:- A
41. The GPT contains all of the Registry entries, as well as associated files and folders
required to implement the various GPO functions.
A. True
B. False
Ans:- A
42. Administrative settings are used to determine the applications that will be distributed
to computers or users via a GPO.
A. True
B. False
Ans:- B
43. The User Group Policy loopback processing mode is used when both the user account
and the computer account are members of a Windows 2000 or later domain.
A. True
B. False
Ans:- A
44. You assign permissions to delegate administrative control over a GPO on the
Delegation tab in the GPMC.
A. True
B. False
Ans:- A