Que.1.
A network router joins two _________ together?
A: Computers
B: Switches
C: Networks
D: Gateway
Right
Answer: C
Que.2.
What is the other types of OLAP apart from ROLAP?
A: HOLAP
B: MOLAP
C: DOLAP
D: Both a and b above
Right
Answer: B
Que.3.
____________ assigns a unique number to each IP network adapter called the MAC
address.
A: Media Access Control
B: Metro Access Control
C: Metropolitan Access Control
D: Both b and c above
Right
Answer: A
Que.4.
What is the full form of CAN?
A: Campus Area Network
B: Cluster Area Network
C: Control Area network
D: both a and b
Right
Answer: D
Que.5.
Dynamic addressing doesn't allow many devices to share limited address space on
a network
A: True
B: False
Right
Answer: B
Que.6.
ARP works on Ethernet networks.
A: False
B: True
Right
Answer: B
Que.7.
__________ is a standard suite of protocols used for packet switching across
computer networks.
A: x.22
B: x.23
C: x.25
D: x.26
Right
Answer: C
Que.8.
NAT stands for
A: network address transformer
B: network address translator
C: network address translation
D: Both b and c above
Right
Answer: C
Que.9.
Piconets in blue tooth a minimum of two and a maximum of ____________ Bluetooth
peer devices.
A: five
B: eight
C: nine
D: four
Right
Answer: B
Que.10.
Which of the following below is/are capability of ICMP protocol?
A: Report package count
B: Report network congestion
C: Both b and d
D: Report availability of remote hosts
Right
Answer: C
Que.11.
What is the full form of URL?
A: Uniform routing locator
B: Uniform Resource locator
C: Universal Resource locator
D: Uniform router locator
Right
Answer: B
Que.12.
The process of assigning IP address for specific times to the various hosts by
DHCP is called as?
A: Lend
B: sublease
C: let
D: Lease
Right
Answer: D
Que.13.
In 10base2, 10base5, what does 2 and 5 stand for?
A: Speed in mbps
B: Number of segments
C: Length of segment
D: Size of segment
Right
Answer: B
Que.14.
Which of the following below are secure VPN protocols?
A: UDP
B: TCP
C: SSTP
D: Both b and c
Right
Answer: D
Que.15.
Which of the following below is a loop back IP address?
A: 127.0.0.0
B: 127.0.1.1
C: 127.0.1.0
D: 127.0.0.1
Right
Answer: D
Que.16.
10Base5, 10Base2, 10BaseT are types of?
A: Internet
B: LAN
C: Ethernet
D: Cables
Right
Answer: C
Que.17.
When computers in a network listen and receive the signal, it is termed as
active toplogy
A: True
B: False
Right
Answer: A
Que.18.
Which of the following is true for secure shell tunneling?
A: To set up an SSH tunnel, one configures
an SSH client to forward a specified local port
B: SSH tunnels provide a means to not
bypass firewalls
C: All SSH clients support dynamic port
forwarding
D: Both a and b
Right
Answer: A
Que.19.
Message Oriented Middleware allows general purpose messages to be exchanged in
a Client/Server system using message queues.
A: True
B: False, it works based on stacks
Right
Answer: A
Que.20.
What is the difference between a switch and a hub?
A: Switches operate at physical layer while
hubs operate at data link layer
B: Switches operate at data link layer
while hubs operate at transport layer
C: Switches operate at data link layer
while hubs operate at physical layer
D: Switches operate at transport layer
while hubs operate at physical layer
Right
Answer: C
I have seen many blogs that provides MCQ on networking but no one gives you the correct answers of the questions they put on their blog . Your blog has questions with answers . Thanks for sharing .
ReplyDeleteRegards
Silvester Norman
Change Mac Address
Thank u 4 ur valuable comment.......its really inspires us to do our job more in best way.....thnx once again........its my pleasure..
ReplyDeleteDear Vyas
ReplyDeleteNice effort. Right answer of question no.13 is option "C" not "B". Please update.
Que.13. In 10base2, 10base5, what does 2 and 5 stand for?
A: Speed in mbps
B: Number of segments
C: Length of segment
D: Size of segment
Right Answer: B
Right Answer: C
Ok. Thanx.....
ReplyDeleteQue.2. What is the other types of OLAP apart from ROLAP?
ReplyDeleteA: HOLAP
B: MOLAP
C: DOLAP
D: Both a and b above
Right Answer: D
Que.13. In 10base2, 10base5, what does 2 and 5 stand for?
A: Speed in mbps
B: Number of segments
C: Length of segment
D: Size of segment
Right Answer: c
Que.14. Which of the following below are secure VPN protocols?
A: UDP
B: TCP
C: SSTP
D: Both b and c
Right Answer: c
Que.17. When computers in a network listen and receive the signal, it is termed as active toplogy
A: True
B: False
Right Answer: b
these are the correct answers so plz fix it so others will not be confused...