Computer Network MCQ (Multiple Choice Questions)
1. Physical or logical arrangement of network is __________
a. Topology
b. Routing
c. Networking
d. Control
2. Which network topology requires a central controller or hub?
a. Star
b. Mesh
c. Ring
d. Bus
3. _______ topology requires a multipoint connection.
a. Star
b. Mesh
c. Ring
d. Bus
4. Data communication system spanning states, countries, or the whole world is ________
a. LAN
b. WAN
c. MAN
d. PAN
5. Data communication system within a building or campus is________
a. LAN
b. WAN
c. MAN
d. PAN
6. WAN stands for __________
a. World area network
b. Comprehensive area network
c. Web area network
d. Web access network
7. In TDM, slots are further divided into __________
a. Seconds
b. Frames
c. Packets
d. Bits
8. _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
a. FDM
b. TDM
c. Both FDM & TDM
d. PDM
9. The sharing of a medium and its link by two or more devices is called _________
a.Fully duplexing
b. Multiplexing
c. Micropleixng
d. Duplexing
10. Multiplexing is used in _______
a. Packet switching
b. Circuit switching
c. Data switching
d. Packet & Circuit switching
11. Which multiplexing technique is used to transmit digital signals?
a FDM
b. TDM
c. WDM
d. FDM & WDM
12. If there are n signal sources of the same data rate, the TDM link has _______ slots.
a. n
b. n/2
c. n*2
d. 2n
13. If the link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of the circuit this TDM is _________
a. 32kbps
b. 500bps
c. 500kbps
d. 32bps
14. The state when dedicated signals are idle is called __________
a. Death period
b. Poison period
c. Silent period
d. Stop period
15. Multiplexing provides _________
a. Efficiency
b. Privacy
c. Anti-jamming
d. Both Efficiency & Privacy
16. The standard documents of IETF are called
a. RCF
b. ID
c. RFC
d. Both A and B
17. When the information packet moves from the higher to lower layers in layer hierarchy, headers are.
a. Removed
b. Rearranged
c. Modified
d. Added
18. The format of data is called
a. Semantics
b. Struck
c. Syntax
d. Both A and B
19.Computer and a keyboard involves¬_________________ transmission to communicate
a. Automatic
b. Simplex
c. Half-duplex
d. Full-duplex
20. The first Network
a. ARPANET
b. CNNET
c. NSFNET
d. ASAPNET
21. ________ physical Path is used to travel massages from one place to another
a. Path
b. Protocol
c. Route
d. Medium
22. Which of these is not a network edge device?
a. Switch
b. PC
c. Smartphones
d. Servers
23. A set of rules that governs data communication
a. Standards
b. RFCs
c. Protocols
d. None of these
24. In which connection, three or more devices share a link
a. Unipoint
b. Point to Point
c. Multipoint
d. None of these
25. When a variety of varied PCs work in a single coherent system to its consumer, then it’s known as
a. computer network
b. networking system
c. distributed system
d. Both A and B
26. Two devices are in the network if
a. a process is running on both devices
b. PIDs of the processes running of various devices area units same
c. a method in one device is in a position to exchange data with a method in another device
d. None of these
27. Which network is built on the top of other networks?
a. overlay network
b. prior network
c. chief network
d. prime network
28. In a computer network, nodes are
a. the computer that originates the data
b. the computer that routes the data
c. the computer that terminates the data
d. all of the mentioned
29. All the machines on the network share the communication channel in
a. unicast network
b. multicast network
c. None of these
d. broadcast network
30. Bluetooth is an example of
a. local area network
b. virtual private network
c. personal area network
d. Both A and B
31. Which of the following is the broadcast address for a Class B network ID using the default subnet mask?
a. 172.16.10.255
b. 255.255.255.255
c. 172.16.255.255
d. 172.255.255.255
32. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?
a. Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d. Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
33. If you wanted 12 subnets with a Class C network ID, which subnet mask would you use?
a. 255.255.255.252
b. 255.255.255.255
c. 255.255.255.240
d. 255.255.255.248
34. The combination of _________ and __________ is often termed the local address of the provincial portion of the IP address.
a Network number and host number
b. Network number and subnet number
c. Subnet number and host number
d. Host number
35. _________ implies that all subnets are obtained from the same subnet mask.
a Static subnetting
b. Dynamic subnetting
c. Variable length subnetting
d. Dynamic length subnetting
36. State whether true or false.
i) A connection-oriented protocol can only use unicast addresses.
ii) The anycast service is included in IPV6.
a. True, True
b. True, False
c. False, True
d. False, False
37. __________ is a high-performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected.
a. FDDI
b. FDDT
c. FDDR
d. FOTR
38. Which of the following are Gigabit Ethernets?
a. 1000 BASE-SX
b. 1000 BASE-LX
c. 1000 BASE-CX
d. All of the mentioned
39. _________ is a collective term for several Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
a. Ethernet
b. Fast Ethernet
c. Gigabit Ethernet
d. Gigabyte Ethernet
40. _________ is another kind of fiber optic network with an active star for switching.
a S/NET
b. SW/NET
c. NET/SW
d. FS/NET
41. Which type of Ethernet framing is used for TCP/IP and DEC net?
a. Ethernet 802.3
b. Ethernet 802.2
c. Ethernet II
d. Ethernet SNAP
42. Consider a situation where you are a system administrator on a NetWare network; you are running NetWare 4.11 and cannot communicate with your Router. What is the likely problem?
a. NetWare 4.11 defaults to 802.2 encapsulation
b. NetWare 4.11 defaults to 802.3 encapsulation
c. Cisco routers only work with NetWare 3.11
d. NetWare 3.11 defaults to 802.2 encapsulation
43. NetWare IPX addressing uses a network number and a node number. Which statement is not true?
a. The network address is administratively assigned and can be up to 16 hexadecimal digits long
b. The node address is always administratively assigned
c. The node address is usually the MAC address
d. If the MAC address is used as the node address, then IPX eliminates the use of ARP
44. Which NetWare protocol works on layer 3–the network layer—of the OSI model?
a. IPX
b. NCP
c. SPX
d. NetBIOS
45. Which NetWare protocol provides link-state routing?
a. NLSP
b. RIP
c. SAP
d. NCP
46. As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What command should you use?
a. Debug IP IGRP event
b. Debug IP IGRP-events
c. Debug IP IGRP summary
d. Debug IP IGRP events
47. What do the following series of commands, “Router IGRP 71 network,” accomplish?
a. It isolates networks 10.0.0.0 and 172.68.7.0
b. It loads IGRP for networks 109 and 71
c. It disables RIP
d. It turns off all routing protocols
48. The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings?
a For LAN interfaces, one tick; for WAN interfaces, six ticks
b. For LAN interfaces, six ticks; for WAN interfaces, one tick
c. For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d. For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
49. As a system administrator, you must set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?
a Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX network 6c
b. Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0 IPX encapsulation sap IPX network 6c
c. Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX
encapsulation sap
d. Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX encapsulation sap IPX network 6c
50. What does the “IPX maximum-paths 2” command accomplish?
a It enables load sharing on two paths if the paths are equal metric paths
b. It sets up routing to go to network 2
c. It is the default for Cisco IPX load sharing
d. It enables load sharing on two paths if the paths are unequal metric paths
51. You want to enable arpa and snap encapsulation on one router interface. How do you do this?
a The interface can handle multiple encapsulation types with no extra configuration
b. Assign two network numbers, one for each encapsulation type
c. Enable Novell-ether to run multiple encapsulation types
d. Both arpa and snap are enabled by default, so you don’t have to configure anything
52. By default, Cisco routers forward GNS SAPs to remote networks.
a. False
b. True
c.iew Answer
53. Cisco routers do not forward them to prevent Service Advertisements (SAPs) from flooding a network. How are services advertised to other networks?
a. Each Router builds its own SAP table and forwards that every 60 seconds
b. Each Router assigns a service number and broadcasts that
c. SAPs aren’t necessary with Cisco routers
d. Cisco routers filter out all SAPs
54. Novell’s implementation of RIP updates routing tables every _________ seconds.
a 60
b. 90
c. 10
d. 30
55. In Novell’s use of RIP, two metrics are used to make routing decisions. Select the correct metrics.
a Ticks & Hops
b. Hops & Loops
c. Loops & Counts
d. Counts & Ticks
56. Which device is used to forward packets b/w networks by processing the information included in the packet?
a. Router
b. Bridge
c. Firewall
d. Hub
57. The number of protocols used by a system, one Protocol per layer, is known as
a. Protocol architecture
b. Protocol suite
c. Protocol stack
d. None of these
58. Network congestion occurs when______
a. When a system terminates
b. When the connection between two nodes terminates
c. None of the mentioned
d. In case of traffic overloading
59. Which network extends a private network across public networks?
a. Local area network
b. Enterprise private network
c. Storage area network
d. Virtual private network
60. Which is not used as a constituent of the residential telephone line?
a. A low-speed downstream channel
b. A high-speed downstream channel
c. A medium-speed downstream channel
d. None of these
61. DSL telco gives which services from the following
a. Wired phone access
b. ISP
c. None of the mentioned
d. All of the mentioned
62. _______ is the function of DSLAM is
a. Convert digital signals into analog signals
b. Convert analog signals into digital signals
c. Amplify digital signals
d. None of these
63. Which term is not associated with DSL
a. DSLAM
b. CMTS
c. CO
d. Splitter
64. HFC contains_______.
a. Fiber cable
b. Coaxial Cable
c. Both Fiber cable and Coaxial cable
d. None of these
65. Which of the following statements is not applicable for cable internet access?
a. It is a shared broadcast medium
b. It includes HFCs
c. Analog signal is converted to digital signal in DSLAM
d. Cable modem connects home PC to Ethernet port
66. Among the optical distribution architectures that are essentially switched, Ethernet is
a. PON
b. NON
c. AON
d. None of these
67. StarBand provides
a. Satellite access
b. FTTH internet access
c. Cable access
d. Telephone access
68. Home Access is provided by
a. DSL
b. FTTP
c. Cable
d. All of these
69. ONT is connected to the splitter using
a. Optical Cable
b. High-speed fiber cable
c. HFC
d. None of these
70. There are ______ number of layers in the internet protocol stack.
a.6
b. 7
c. 5
d. None of these