Que.1.
A network router joins two _________ together?
A: Computers
B: Switches
C: Networks
D: Gateway
Right
Answer: C
Que.2.
What is the other types of OLAP apart from ROLAP?
A: HOLAP
B: MOLAP
C: DOLAP
D: Both a and b above
Right
Answer: B
Que.3.
____________ assigns a unique number to each IP network adapter called the MAC
address.
A: Media Access Control
B: Metro Access Control
C: Metropolitan Access Control
D: Both b and c above
Right
Answer: A
Que.4.
What is the full form of CAN?
A: Campus Area Network
B: Cluster Area Network
C: Control Area network
D: both a and b
Right
Answer: D
Que.5.
Dynamic addressing doesn't allow many devices to share limited address space on
a network
A: True
B: False
Right
Answer: B
Que.6.
ARP works on Ethernet networks.
A: False
B: True
Right
Answer: B
Que.7.
__________ is a standard suite of protocols used for packet switching across
computer networks.
A: x.22
B: x.23
C: x.25
D: x.26
Right
Answer: C
Que.8.
NAT stands for
A: network address transformer
B: network address translator
C: network address translation
D: Both b and c above
Right
Answer: C
Que.9.
Piconets in blue tooth a minimum of two and a maximum of ____________ Bluetooth
peer devices.
A: five
B: eight
C: nine
D: four
Right
Answer: B
Que.10.
Which of the following below is/are capability of ICMP protocol?
A: Report package count
B: Report network congestion
C: Both b and d
D: Report availability of remote hosts
Right
Answer: C
Que.11.
What is the full form of URL?
A: Uniform routing locator
B: Uniform Resource locator
C: Universal Resource locator
D: Uniform router locator
Right
Answer: B
Que.12.
The process of assigning IP address for specific times to the various hosts by
DHCP is called as?
A: Lend
B: sublease
C: let
D: Lease
Right
Answer: D
Que.13.
In 10base2, 10base5, what does 2 and 5 stand for?
A: Speed in mbps
B: Number of segments
C: Length of segment
D: Size of segment
Right
Answer: B
Que.14.
Which of the following below are secure VPN protocols?
A: UDP
B: TCP
C: SSTP
D: Both b and c
Right
Answer: D
Que.15.
Which of the following below is a loop back IP address?
A: 127.0.0.0
B: 127.0.1.1
C: 127.0.1.0
D: 127.0.0.1
Right
Answer: D
Que.16.
10Base5, 10Base2, 10BaseT are types of?
A: Internet
B: LAN
C: Ethernet
D: Cables
Right
Answer: C
Que.17.
When computers in a network listen and receive the signal, it is termed as
active toplogy
A: True
B: False
Right
Answer: A
Que.18.
Which of the following is true for secure shell tunneling?
A: To set up an SSH tunnel, one configures
an SSH client to forward a specified local port
B: SSH tunnels provide a means to not
bypass firewalls
C: All SSH clients support dynamic port
forwarding
D: Both a and b
Right
Answer: A
Que.19.
Message Oriented Middleware allows general purpose messages to be exchanged in
a Client/Server system using message queues.
A: True
B: False, it works based on stacks
Right
Answer: A
Que.20.
What is the difference between a switch and a hub?
A: Switches operate at physical layer while
hubs operate at data link layer
B: Switches operate at data link layer
while hubs operate at transport layer
C: Switches operate at data link layer
while hubs operate at physical layer
D: Switches operate at transport layer
while hubs operate at physical layer
Right
Answer: C