You are on page 1of 36

Networking Multiple Choice Questions

1.ICMP is primarily used for ……………….


a) error and diagnostic functions
b) addressing
c)forwarding
d)routing
2. In OSPF , which protocol is used to discover neighbor routers automatically?
a)link state protocol
b)error-correction protocol
c)Routing information protocol
d)HELLO protocol
3. Which of the following items is not used in local area network (LAN)?
a) Cable
b) Printer
c) Modem
d) Computer
Ans: C
4. TCP groups a number of bytes together into a packet called …….
a) Packet
b) Buffer
c)Segment
d) Stack
5. The OSPF protocol
a) has the ability to discover a network€™s specific topology
b) is a link-state route discovery protocol
c) provides better performance than RIP in large internet-works
d) all of these

6. The data link layer takes the packets from…………….. and encapsulication
them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d)application layer

7. Which of the following functionalities must be implemented by a transport


protocol over and above the network protocol?
a) End to end connectivity
b) Packet delivery in the correct order
c) Detection of duplicate packets
d) Recovery from packet losses

8. An organization has a class B network and wishes to form subnets for 64


departments. The subnet mask would be
a) 255.255.252.0
b) 255.255.128.0
c) 255.255.64.0
d) 255.255.0.0
9. Which of the following protocol is used for remote terminal connection service?
a) RARP
b) UDP
c) FTP
d) TELNET

10. Which of the following terms is just the collection of networks that can be
joined together?
a) Intranet
b) Extranet
c) Internet
d) LAN

11. Bluetooth is an example of


a) Wide area network
b) Virtual private network
c) Local area network
d) Personal area network

12. The application layer of the OSI model is


a) Four layer
b) Five layer
c) Six layer
d) Seven layer
13. Header size of the ICMP message is …………….
a) 8-bytes
b)8-bites
c) 16-bytes
d) 16-bits

14. Different computers are connected to a LAN by a cable and


a) Telephone lines
b) Special wires
c) Interface card
d) Modem

15.which of the following is false with respect to the features of OSPF ?


a) More flexible link cost than can range from 1 to 65535
b) User of designated router
c) Support for flexed length subnetting by including the subnet mask in the routing
message.
d)Distribution of traffic over multiple paths that have equal cost to the destination.

16. The application layer of a network

a) consists of software being run on the computer connected to the network

b) Establishes, maintain and terminates virtual circuits

c) Defines user’s port into the network

d) None of these
17. In asymmetric key cryptography, the privet key is kept by………..?

a)sender

b)receiver

c)sender and receiver

d)all the connected device to the network

18. WAP2 is used for security in……..

a) ethernet

b)Bluetooth

c)wi-fi

d)e-mail

19. what is the access point (AP) in a wireless LAN?

a)device that allows wireless devices to connect to a wired network

b)wireless devices itself

c)both device that allows wireless devices to connected to a wired network and
wireless devices itself

d) all the nodes in the network

20. Wireless transmission of signals can be done via …..?

a)radio waves

b)microwaves

c)infrared

d) all of the mentioned


21.Traffic in a VPN is NOT ………..?

a)invisible from public network

b)logically separated from other traffic

c)accessible from unauthorized public networks

d)restricted to a signal protocol in IP sec

22. What frequency range is used for micro-waves communication, satellite and
radar?

a) Extremely high frequency : 30,000 MHz

b) Super high frequency : 3000 MHz to 30000 MHz

c) Medium frequency : 300 kHz to 3 MHz

d) Low frequency : 30 kHz to 300 kHz

23. The physical layer of a network

a) Constructs packets of data and sends them across the network

b) Controls error detection and correction

c) Defines the electrical characteristics of signals passed between the computer


and communication devices

d) None of these

24. which is not a application layer protocol?

a) HTTP

b) SMTP

c) FTP

d) TCP
25. A collection of computers and devices connected together via communication
devices and transmission media is called a

a) Network

b) Mainframe

c) Server

d) Workgroup

26. The communication mode that supports data in both directions at the same time
is

a) Multiply

b) Duplex

c) Half duplex

d) Simplex

27. An alternate name for the completely interconnected network topology is

a) Mesh

b) Star

c) Ring

d) Tree

28. You to set your telnet password on cisco router?

a)line cono

b)line vty 0 4

c) line telnet 0 4

d) line aux 0 4
29. If you would like to give IP address to 30 hosts from your IP prefix which
subnet mask do you use most effectively?

a) 255.255.255.128

b) 255.255.255.240

c) 255.255.255.248

d) 255.255.255.224

30. What is the broadcast address of prefix 172.18.16.0/21?

a) 172.18.25.255

b) 172.18.0.255

c) 172.18.30.255

d) 172.18.23.255

31. which of the following the valid host range for the subnet on which the IP
address 192.168.168.188 255.255.255.192 resides?

a) 192.168.168.129- 190

b) 192.168.168.129- 191

c) 192.168.168.128- 192

d) 92.168.168.128- 193

32. How many usable hosts can we get when i use 255.255.255.252 as the subnet
mask in the ip?

a) 1

b) 5

c) 4

d) 2
33. What will be the default subnet mask for the Class C IP addresses?

a) 255.0.0.0

b) 255.255.0.0

c) 255.255.255.0

d) 255.255.255.255

34. What will be the subnet mask for the following IP address 100.101.110.100/7?

a) 254.0.0.0

b) 248.0.0.0

c) 252.0.0.0

d) 192.0.0.0

35. What is main purpose of using subnetting?

a) It divides a network into network classes

b) It can speed up the network

c) It divides one large network into several smaller ones

d)None of the above

36. Three or more devices share a link in ________ connection -


a) Multipoint
b) Point to point
c) Unipoint
d) None of the mentioned
37. Communication channel is shared by all the machines on the network in
a) unicast network
b) broadcast network
c) multicast network
d) none of the mentioned

38. In computer network nodes are

a) the computer that routes the data


b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned

39. Bluetooth is an example of

a) local area network


b) virtual private network
c) personal area network
d) none of the mentioned

40. The physical layer concerns with


a) process to process delivery
b) application to application delivery
c) bit-by-bit delivery
d) none of the mentioned

41. Which one of the following is not a function of network layer?


a) inter-networking
b) congestion control
c) routing
d) none of the mentioned
42. The network layer protocol of internet is called -

a) internet protocol
b) hypertext transfer protocol
c) ethernet
d) none of the mentioned

43. The data link layer takes the packets from _________ and encapsulates them
into frames for transmission.

a) physical layer
b) transport layer
c) network layer
d) application layer

44. Which one of the following is a data link protocol?

a) point to point protocol


b) hdlc
c) ethernet
d) all of the mentioned

45. Physical or logical arrangement of network is __________

a) Networking
b) Topology
c) Routing
d) None of these

46. Transmission control protocol is

a) uses a three way handshake to establish a connection


b) recievs data from application as a single stream
c) connection oriented protocol
d) all of the mentioned

47. Transport layer protocols deals with


a) process to process communication
b) application to application communication
c) node to node communication
d) none of the mentioned

48. This topology requires multipoint connection


a) Mesh
b) Star
c) Ring
d) Bus

49. Multiplexing is used in _______


a) Circuit switching
b) Data switching
c) Packet switching
d) Packet & Circuit switching

50. Multiplexing can provide ________


a) Anti jamming
b) Efficiency
c) Privacy
d) Both Efficiency & Privacy

51. What is firewall in computer network?


a) Web browsing software
b) Operating system
c) Physical boundary of Network
d) System software to prevent unauthorized access

52. TCP/IP model does not have ................


a) Session layer
b) Network layer
c) Transport layer
d) Application layer
53. A single channel is shared by multiple signals by .......................

a) Multiplexing
b) Digital modulation
c) Analog modulation
d) None of the above

54. What does SMTP stands for?


a) Simple Mail Terminal Protocol
b) Simple Mail Transfer Protocol
c) Simple Mail Transport Protocol
d) None of the above

55. Which of the following protocol is used for remote terminal


connection service?
a) RARP

b) UDP

c) FTP

d) TELNET

56.Computers connected to a LAN (Local Area Network) can

a) Share information and/or share peripheral equipment

b) E-mail

c) Go on line

d) Run faster

57.Which of the following is not a disadvantage of wireless LAN?

a) Slower data transmission

b) Higher error rate

c) Interference of transmissions from different computers

d) All of the above

58.ICMP (internet control message protocol) is a protocol

a) used to monitor computers

b) that handles error and control messages

c) for transferring files from one machine to another

d) used to dynamically bind a high level IP address to a low-level


physical hardware address
59.A half-duplex communication channel permits information to travel

a) At timed intervals
b) One direction only
c) Both ways, but not at once
d) Both ways at once

60.Each IP packet must contain

a) Only source address


b) Only destination address
c) Source and Destination address
d) Source or Destination address

61. Which command is used to determine if an IP access list is enabled


on a particular interface?

a) show access-lists
b) show interface
c) show ip interface
d) show interface access-lists

62. Which protocol does DHCP use at the Transport layer?

a) IP
b) TCP
c) UDP
d) ARP

63.  What protocols are used to configure trunking on a switch?

VLAN Trunking Protocol

VLAN

802.1Q
ISL

a) 1 and 2
b) 3 and 4
c) 1 only
d) 2 only

64. TCP process may not write and read data at the same speed. So we
need __________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks

65. Communication offered by TCP is ________


a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte

66. Bytes of data being transferred in each connection are numbered by


TCP. These numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s

67. A local telephone network is an example of a _______ network.


a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched
68. Most packet switches use this principle ____________
a) Stop and wait
b) Store and forward
c) Store and wait
d) Stop and forward

69. Which protocol does Ping use?

a) TCP
b) ARP
c) ICMP
d) BootP

70.  What are the Methods to move data through a network of links and
switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching

71. The required resources for communication between end systems are
reserved for the duration of the session between end systems in ________
method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching

72. Which one of the following is true regarding VLANs?

a) Two VLANs are configured by default on all Cisco switches.


b) VLANs only work if you have a complete Cisco switched internetwork. No
off-brand switches are allowed.
c) You should not have more than 10 switches in the same VTP domain.
d) VTP is used to send VLAN information to switches in a configured VTP
domain.

73. What does a VLAN do?

a. Acts as the fastest port to all servers.


b. Provides multiple collision domains on one switch port.
c. Breaks up broadcast domains in a layer 2 switch internetwork.
d. Provides multiple broadcast domains within a single collision domain.

74. Which of the following is not an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) Error control

75. Which of this is not a constituent of residential telephone line?


a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) An ultra-high speed downstream channel

76. DSL telcos provide which of the following services?


a) Wired phone access
b) ISP
c) Wired phone access and ISP
d) Network routing and ISP
77. The function of DSLAM is to __________
a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals

78. Which router command allows you to view the entire contents of all
access lists?

a. show all access-lists


b. show access-lists
c. show ip interface
d. show interface

79. Which class of IP address has the most host addresses available by default?

a. A
b. B
c. C
d. A and B

80. In a network with dozens of switches, how many root bridges would you have?

a. 1
b. 2
c. 5
d. 12

81. Which of the following statements is not applicable for cable internet
access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM

82. StarBand provides __________


a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access

83. Home Access is provided by __________


a) DSL
b) FTTP
c) Cable
d) All of the mentioned

84. ONT is connected to splitter using _________


a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable

85. Which field helps to check rearrangement of the fragments?


a) Offset
b) Flag
c) TTL
d) Identifier

86. Which of these is not applicable for IP protocol?


a) Connectionless
b) Offer reliable service
c) Offer unreliable service
d) Does not offer error reporting

87. an classless addressing, there are no classes but addresses are still
granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes

88. In IPv4 Addresses, classful addressing is replaced with ________


a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising

89. First address in a block is used as network address that represents the
________

a) Class Network
b) Entity
c) Organization
d) Codes

90. In classful addressing, a large part of available addresses are


________

a) organized
b) Blocked
c) Wasted
d) Communicated

91. Network addresses are a very important concept of ________


a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing

92. The combination of _________ and __________ is often termed the


local address of the local portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number

93. _________ implies that all subnets obtained from the same subnet
mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Dynamic length subnetting

94. How many broadcast domains are created when you segment a network with a
12-port switch?

a. 1
b. 2
c. 5
d. 12

95. What does the command routerA(config)#line cons 0 allow you to


perform next?

a. Set the Telnet password.


b. Shut down the router.
c. Set your console password.
d. Disable console connections.

96. _________ is a collective term for a number of Ethernet Standards


that carry traffic at the nominal rate of 1000 Mbit/s against the original
Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) Gigabyte Ethernet

97. Where is a hub specified in the OSI model?

a. Session layer
b. Physical layer
c. Data Link layer
d. Application layer

98. IPSec is designed to provide security at the _________


a) transport layer
b) network layer
c) application layer
d) session layer
99. In tunnel mode, IPSec protects the ______
a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer

100.  Network layer firewall works as a ________


a) frame filter
b) packet filter
c) signal filter
d) content filter
101. switch in a datagram network uses a routing table that is based on the
_________ address.

a) source
b) destination
c) local
d) none of the above

102.Which of the following protocol is used for remote terminal


connection service?

a) RARP
b) UDP
c) FTP
d) TELNET

103.The application layer of the OSI model is

a) Four layer
b) Five layer
c) Six layer
d) Seven layer
104.Which of the following protocols are examples of TCP/IP transport layer
protocols?

a) Ethernet
b) HTTP
c) IP
d) UDP
105.Which of the following protocols are examples of TCP/IP data-link layer
protocols?

a) Ethernet
b) HTTP
c) IP
d) UDP

106.Which of the following commands list the OSPF neighbors off interface serial
0/0?
(Choose two answers.)
a) show ip ospf neighbor
b) show ip ospf interface brief
c) show ip neighbor
d) show ip interface
e) show ip ospf neighbor serial 0/0

107.On which default interface have you configured an IP address for a


switch?
a) int fa0/0
b) int vty 0 15
c) int vlan 1
d) int s/0/0

108. How large is the typical network portion of an IPv6 global unicast


address?
a) 32 bits
b) 48 bits
c) 64 bits
d) 128 bits
 
109. In OSPF, Hellos are sent to what IP address?
a) 224.0.0.5
b) 224.0.0.9
c) 224.0.0.10
d) 224.0.0.1
 
110. You have an interface on a router with the IP address of
192.168.192.10/29. Including the router interface, how many hosts can have IP
addresses on the LAN attached to the router interface?
a) 6
b) 8
c) 30
d) 62

111.What are the eight binary values found in a single octet of an IP address?

a) 256 128 64 32 16 8 4 2
b) 254 62 30 14 6 4 0
c) 128 64 32 16 8 4 2 1
d) 0 2 4 6 8 10 12 14

112. What is the decimal value of binary 00001110 ?


a) 13
b) 14
c) 1,110
d) 16

113. What is the binary value of decimal 256?


a) 11111111
b) 1111111111
c) 100000000
d) 10000000

114.How many hosts are on the network 172.16.41.0/27?

a) 65,534
b) 32
c) 254
d) 30

115. Which command is used to determine if an IP access list is enabled on a


particular interface?

a) show access-lists
b) show interface
c) show ip interface
d) show interface access-lists

116. Dhcp client in the back cannot communicate with hosts in the outside of their
subnet ?

a) need to activate dhcp pool


b) need to configure default gateway
c) other option
d) other option

117.DHCP (dynamic host configuration protocol) provides __________ to the


client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned

118.Which is not a application layer protocol?


a) HTTP
b) SMTP
c) FTP
d) TCP

119. The packet of information at the application layer is called __________


a) Packet
b) Message
c) Segment
d) Frame
120. Open Shortest Path First (OSPF) is also called as _____________
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Border gateway protocol

121. In OSPF, which protocol is used to discover neighbour routers automatically?


a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Hello protocol

122. Secure shell (SSH) network protocol is used for __________


a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned

123.Transport layer aggregates data from different applications into a single stream
before passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer

124. Which software prevents the external access to a system?

a) Firewall
b) Gateway
c) Router
d) Virus checker

125. The maximum length (in bytes) of an IPv4 datagram is?

a) 32
b) 1024
c) 65535
d) 512
126. Which of the following IP addresses can be used as (a) loop-back addresses?

a) 0.0.0.0
b) 127.0.0.1
c) 255.255.255.255
d) 0.255.255.255

127. Transmission of digital data between two or more computers is called?


a) Internet
b) Network
c) Ethernet
d) Data communication

128. What is a PAN?


a) Personal area network
b) Popular area network
c) Part area network
d) Public area network

129. The network arrangement containing nodes, hubs/switches, and connecting


lines circulating data from sender to receiver is called?
a) Server
b) Data communication
c) Internet protocol
d) Network topology

130. What is the PTP protocol ?


a) Point to point protocol
b) Plane to the plane protocol
c) Point to the plane protocol
d) None of the above
131.What protocol does PPP use to identify the Network layer protocol?
a) NCP
b) ISDN
c) HDLC
d) LCP
132. Which protocol does DHCP use at the Transport layer?

a) IP
b) TCP
c) UDP
d) ARP

133. The physical path between sender and receiver through which the message or
data travels.
a) Hub/switch
b) transmission medium
c) client
d) server

134. What is FTP?


a) File transfer protocol
b) File transmission protocol
c) File transfer protection
d) File transmission protection

135. Communication in which transfer of data takes place in both the direction but
one at a time?
a) duplex communication
b) half-duplex communication
c) simplex communication
d) none of the above
136. Hardware layers of OSI
I. Network layer
II. Datalink layer
III. Physical Layer
IV. Transporter layer
a) I, II, III, IV
b) none of the above
c) I, III
d) IV

137. What is the role of the transport layer in the TCP / IP model?
a) Combination of TCP / IP, UDP, SCTP
b) Contains the address of senders as well as the receiver and the location at
which the data should be transferred
c) Both A and B
d) None of the above

138. why TCP / IP model is the most used networking model in world?
I) Set of protocols that allows communication between multiple devices
II) Designed and developed by the department of defense DOD in 1960
III) Robust to failures and flexible to diverse networks
IV) Most widely used network and become standard networking option for Unix
based interoperating computers
a) I, II, III,IV
b) none of the above
c) I, III
d) IV

139. What is a physical network topology ?


a) Manual setting up cables and layers of a network is called a physical
network topology.
b) The physical design of a network, including the network devices used,
location to establish, and cables used, mainly the structure and blueprint of
the network that will be enabled
c) Runtime codes deployed at the time of processing is called a physical
network topology.
d) How the data moves throughout the network. this consist of CSMA / CA,
CSMA / CD,

140. What is a Basic Router?


I) A device used to connect different networks altogether and Routes traffic
between different networks using IP address.
II) A connecting device that makes Computer networking enables a much faster
and more efficient communication mode than earlier postal service. This includes
email, telephonic communication, video conferencing etc.
III) It uses intelligent decisions, also known as routing protocols, in order to find
the best way to get a packet of information from one network to another.
IV) It can either work as an expansion card, USB device or built and attached
directly to the motherboard.

a) all of the above


b) none of the above
c) I, III
d) IV

141. Modes of wireless transmission of data?


I. Radio waves
II. Infrared transmission
III. Light transmission
IV. Microwaves
a) all of the above
b) none of the above
c) I, III
d) IV
142. What does PPP stands for?
a) protect to peer protocol
b) peer to peer protocol
c) point point protocol
d) none of the above

143. First Layer to send or receive data through one device to other
a) Mac address
b) Physical Layer
c) Ip address
d) All of the above
144. Communication in which transfer of data takes place in both the direction and
also at the same time?
a) Full duplex communication
b) half-duplex communication
c) simplex communication
d) none of the above

145. What is a geographical span in computer networks?


a) Area covered under a certain network
b) Connectivity rate at which data is transferred
c) How the devices are connected in order to transfer data
d) None of the above

146) Types of the data transmission medium.


I) Twisted wire
II) Coaxial cable
III) fiber optic cable
IV) Radio waves
a) I, II, III, IV
b) none of the above
c) I, II, III
d) IV

You might also like