0% found this document useful (0 votes)
61 views31 pages

Network MCQ

Uploaded by

kirolos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
61 views31 pages

Network MCQ

Uploaded by

kirolos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 31
Computer Network MCQs 11, What does PoP stand for? Pre Office Protocol Protocol of Post None 2. What is the port number of PoP? Hide |3, What is the number of layers the OSI model? 2 layers 4 layers Hide 4.The Hide Slayers full form of OSI is? Operating System interface ‘Optical System interconnection ‘Operating System Internet 5. Identify the layer which provides service ta the user. Hide Session layer Presentation error Physical layer 6. What is a HUB? Software Computing device Calculating device 7. What does a set of rules define? SMTP. Hide {8 Identify among the following which is mainly used to host web site, Mail server None Hide ‘9. Identity the full form of HTTP? Hypertext Transfer Package Hyper Transfer Text Package Hyper Transfer Text Practice 10, Ident & g ; 8 i : i 3 : rep Hide 11, Identify the total versions of IP Hide 12, Identify the first network which was based on TCP/IP protocol. HUB Ethernet Card Router Hide 13, Choose among the following, which is the most common internet protocol. PPP FIP. TcPAP Hide 14, What does TCP/IP stand for? Telephone control protocol / Internet Protocol Transmission control protocol/Intermational protocol None ide 15, Which of the following layer isn’t present in the TCP/IP model but is Network layer Application layer Transport layer Hide 16. What is the collection of the hyperlinked decument on the internet known as? HTML Email Internet Hide 17. What is the location of a resource on the internet given by? Email iP Protocol Hide 18, Identify the incorrect network topology, Ring Hide 20. What is the length of the IPv4 address? Bits bits 128 bits Hide 21. What is the length of the IPv6 address? B bits 1G bits 32 bits lide 22. What is the term used when the main server sends mail to another mail server? TCe/E MIME Hide 23, What is the port number of SMTP? 110 143 Hide 24, What does MIME stand for? Multipurpose Internet Mail Extra Multi Internet Mail End Multipurpose Internet Mail Email Hide 25, What does port number 143 refer to? ide 26. Identify among the following the network device used to connect two dis-similar types of networks. switch, Hub g | Hide 27. Identify the device used to boost up a weak signal. Modem switch Router Hide 28, What does MAC stand for? Mass Access Control Media Access Carriage None Hide 29. What is the length of the MAC address? B bits 1G bits 32 bits Hide 30. Which of the following is used to allocate and manage resources for a network? Bluetooth Node. None of the above Hide 131. The arrangement where all data pass through a central computer is known as Ring topology Mesh topology Bus topology Hide 132. What of the following device is used in the network layer? Application gateway Ss Repeaters Hide 122. Identify if the following statement is True or False: Network Interface Card{(NIC) is an YO device. False Depends on usage None Hide 34, What is required to use a Simple Network Management System? Servers 8 Hide 35, Identify the major difference between SNMPv3 and SNMPV2. Classification (1) integration Management ide 36. Identify the network which extends a private network across a public network. Storage Area network Enterprise Private network Local area network. Hide 37. Identify the layer which is responsible for data translating, Network Datalink, Application Hide 38, Identify the layer which determines the interface of the system with the user. (Network Datalink Presentation lide 39, Which of the following topology arrangements is @ point-to-point line configuration? OD atog Mesh Star 40, Identify the device which links two homogeneous packed broadcast local networks. Hub OD Router Hide a Hide Gateway Why are party bits used? To encrypt data To identity user Identify among the following which belongs to class A. 128.12.12.248 129.12.12.248, 130.12.12.248, “43, What does LAN stand for? Hide Local Array Network Local Area Net None 44, Who keeps the private key in asymmetric key cryptography? sender Both Sender and Receiver None 145, Calculate the maximum efficiency of pure ALOHA at G = 05 16% CO t29% 19.49% Hide 145, Identify the switching method in which the message is divided into small packets. Viral switching Message switching None lide 47. What is a proxy server also known as? Proxy tools ‘Application proxy None Hide 48, Identify among the following servers which allow LAN users to share data, ‘Communication server Point server Data server Hide 49, Choose the correct formula for the total vulnerable time value of pure ALOHA. ‘ele Hide 50. Choose among the following which is a bit-oriented protocel, 38L All of the above Computer Network MCQ —— 1) Which of these is a standard interface for serial data transmission? a. ASCIL b. RS232C a2 d. Centronics D Hide answer [ Workopace Answer: (b) RS232C Explanation: The RS232C is a standard interface for serial data transmission that defines the protacol and physical interface for transmitting serial data fairly easily between associated appliances and computers. 2) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets? a. Ring b. Local area . Hierarchical d. Star ®D Hite Answer (B Workspace Answer: (d) Star Explanation: The star topology is the best network topology for large businesses because it is simple to control and coordinate from the central computer. 3) Which of the following transmission directions listed is not 4 legitimate channel? a. Simplex b. Half Duplex c. Full Duplex d. Double Duplex D hlideanswer (Workspace Answer: (d) Double Duplex Explanation: Double duplex is not a legitimate channel for trans in computer network. 4) "Parity bits” are used for which of the following purposes? a. Encryption of data b. To transmit faster c. To detect errors d. To identify the user D hlideanswer (Workspace Answer: (c) To detect errors Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1. It is used for error detection for blocks of data. 5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences? a. Unshielded twisted pair b. Optical fiber c. Coaxial cable d. Microwave ®D Hide Answer (PB Workspace Answer: (b) Optical fiber Explanation: The optical fiber is made of glass or plastic. In this cable, the transmission of data ‘occurs in the form of light rather than the electric current, so tt cable provides higher data transfer speed than other cables. 6) A collection of hyperlinked documents on the internet forms the ?.7 a. World Wide Web (WWW) b. E-mail system c. Mailing list d. Hypertext markup language D Hide answer (BF Workspace Answer: (a) World Wide Web (WWW) Explanation: World Wide Web (WWW) creates a collection of hyperlinked documents on the Internet. 7) The location of a resource on the internet is given by its? a. Protocol b. URL c. E-mail address d. ICQ @ Hide Anewer [B Workspace ‘Answer: (b) URL Explanation: A URL (Uniform Resource Locator) is a database connection that describes the database's location on a computer network and the retrieval process. A URL is a different form of URI (Uniform Resource Identifier) although the two words are used interchangeably by many people. 8) The term HTTP stands for? a. Hyper terminal tracing program b. Hypertext tracing protocol c. Hypertext transfer protocol d. Hypertext transfer program D tide Answer Workspace Answer: (c) Hypertext transfer protocol Explanation: The term HTTP stands for Hypertext transfer protocol 9) A proxy server is used as the computer? a. with external access b. a 1g as a backup c. performing file handling d. accessing user permissions ®D Hide Answer (@ Workspace Answer: (a) with external access Explanation: A proxy server is a computer that acts as a gateway between a user’s computer and the Internet. The proxy server is also called application level gateway. By this the client computer can establish indirect network connection to another network. 10) Which one of the following would breach the integrity of a system? a. Looking the room to prevent theft b. Full access rights for all users c. Fitting the system with an anti-theft device d. Protecting the device against willful or accidental damage D Hide Answer (PF Workspace Answer: (b) Full access rights for all users Explanation: None 11) Which software prevents the external access to 2 system? a. Firewall b. Gateway c. Router d. Virus checker D Hide Answer (PF Workspace Answer: (a) Firewall Explanation: A firewall is a network securing software that prevents unauthorized users and dangerous elements from accessing the network. Software firewall acts as ¢ filter for our network which prevents harmful information. 12) Which one of the following is a valid email address? a. [email protected] b. gmailcom c. [email protected] d. javetpoint@books

You might also like