You are on page 1of 5

COMPUTER NETWORKS ESSENTIALS NTS MCQS

Q. Gateways are distinct from routers or switches in that


I. they communicate using more than one protocol.
II. they can operate at any of the seven layers of OSI model.
III. they assign IP address to devices connected to a network that uses TCP/IP.
Select the appropriate:
A. I only
B. I and II only
C. II and III only
D. I, II, and III.

Q1. What is the most widely used protocol for local area networks?
A. HTML
B. TCP/IP
C. Token ring
D. Ethernet

Q2. What data communications hardware converts data from one standard to another?
A. Hub
B. Router
C. Repeater
D. Gateway

Q3. All of the following are benefits associated with the use of twisted-pair wiring EXCEPT:
A. easy to work with.
B. readily available.
C. inexpensive to purchase.
D. highly secure.

Q. Networking attacks can be classified as 


I. DNS hacking
II. routing table poisoning
III. packet mistreatment
IV. denial of service

A. I and II only
B. II and IV only
C. I , II, and IV only
D. All I , II, III and IV

Q. Which is incorrect (Protocol, Port) pair of the followings? 


A. Telnet, Port 23
B. Web Traffic, Port 80
C. HTTPS, Port 8080 correct is Port-443
D. DNS, Port 53
E. FTP, Port 21

Q. A firewall needs to be ____ so that it can grow with the network it protects.

A. Robust
B. Expansive 
C. Fast
D. Simple
Q. The ________ is a UDP-based network protocol that is used to monitor network devices for
conditions that require the attention of an administrator.

A. SNMP (Secure Network Management Protocol) 


B. SNMP (Simple Network Management Protocol)
C. SNMP (Secure Network Monitoring Protocol) 
D. SNMP (Simple Network Monitoring Protocol)

Q. Which standard TCP port is assigned for contacting SSH servers?


a) port 21
b) port 22
c) port 23
d) port 24

Q. In _______, the bandwidth of the modulated signal must be _____ the bandwidth of the
modulating signal.
I. AM Radio, twice
II. FM Radio, twice
III. AM Radio, 10 times
IV. FM Radio, 10 times
Select the correct combination of the followings.
A. I & II
B. II & III
C. I & IV
D. III & IV

Q. Consider the following statements.


I. The Nyquist formula determines the theoretical data rate for a noiseless channel.
II. The Shannon capacity determines the theoretical maximum data rate for a noisy channel.

A. Only statement I is correct.


B. Only statement II is correct.
C. Both statements I and II are correct.
D. Both statements I and II are incorrect.

Q. ______ levels of addresses are used in an internet employing the TCP/IP protocols.

A) Three
B) Two
C) Four
D) Five

Q. Media Access Control (MAC) and Logical Link Control (LLC) are two sublayers of
_________________.
A. Session layer 
B. Network layer 
C. Transport layer 
D. Data Link layer
E. Physical Layer

Q. Which of the following are benefits of VLANs?


I. They increase the size of collision domains.
II. They allow logical grouping of users by function.
III. They can enhance network security.
IV. They increase the size of broadcast domains while decreasing the number of collision
domains.
V. They simplify switch administration.
VI. They increase the number of broadcast domains while decreasing the size of the broadcast
domains.

A. I and V
B. II and IV
C. I, III and V
D. II, III and VI

Q. Usually _____ is used but if latency is a greater concern than reliability, _____ may be used.
A. TCP, UDP 
B. UDP, TCP 
C. TCP, IP
D. IP, TCP

Q. Frequency of failure and network recovery time after a failure are measures of what concept
of a network ?
A. Performance
B. Reliability
C. Security
D. Feasibility

Q.To see how many hops a packet takes to reach a destination, use the ____ command.
A. telnet 
B. tracert 
C. ping
D. ipconfig

Q.The topology with highest reliability is

A. bus topology
B. star topology
C. ring topology
D. mesh topology

Q. In peer-to-peer/point-to-point (P2P) networking:


A. there is only one server and many clients
B. there is only one client and many servers
C. every computer is capable of playing the role of server
D. every computer is capable of playing the role of client, server or both at the same time

Q. What is the IEEE 802.3 standard related to?


A. Ethernet
B. Token Bus
C. Token Ring
D. Definition of the Logical Link Control (LLC) sublayer

Q. What is the recommended maximum length(approx) for a segment of UTP cable? 


A. 500m
B. 1km
C. 100m
D. 180m
Q. What layer is HTTP?
A. Network Layer
B. Transport Layer
C. Application Layer 
D. Physical Layer

Q. What is full form of MODEM ?


A. Modulation-Demodulation 
B. Modulator-Demodulator
C. Monitor of Demodulation
D. Mode of Electronic Modulator

Q.A ________ is a data communication system covering an area the size of a town or city.
A. LAN 
B. WAN
C. MAN
D. VLAN

Q.Transmission and reception of signals is the function of ______ layer.


A. Transport 
B. Physical 
C. Data-Link 
D. Network 
E. None of these

Q. In which layer of OSI model, Telnet and FTP work?


A. Application
B. Session
C. Network 
D. Transport

Q. Segmentation and reassembly is responsibility of ______ layer of OSI model. 


A. 4th
B. 3rd
C. 2nd
D. 1st 
Q. Segmentation is done in _______ of OSI model.
A. Transport layer
B. Network layer
C. Data link layer
D. Physical layer

Q. To connect to a network, a computer uses a _______ card.


A. network interface 
B. controller interface
C. modem internet
D. graphics interface
E. sound

Q. How is a unique MAC address assigned to a Network


Interface Card?
A. It is built into the card when the card is manufactured
B. The network administrator must assign the address
C. A unique address is automatically assigned when the card 
drivers are installed
D. A unique address is automatically assigned whenever you 
boot up the computer

Q. In wireless ad-hoc network


a) access point is not required
b) access point is must
c) nodes are not required
d) none of the mentioned

The first Network


a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET

You might also like