Try new tool: URL Shortener

https://res.cloudinary.com/hg6hswtwo/image/upload/v1/media/pics/Computer_Networking_and_security_MCQs_-_toolsandjobs_uyd5ed
lastyear

Computer Networking and security important MCQ's for interviews & exams - Part 2





This post contains very important MCQ's for Computer networks & security to prepare your interviews and exams easily...

Computer Networking and security important MCQ's for preparing interviews & exams - Part 2

Q.no 1. Radio channels are attractive medium because
A : Can penetrate walls
B : Connectivity can be given to mobile user
C : Can carry signals for long distance
D : All of the mentioned

Answer:- D : All of the mentioned

Q.no 2. Bridge works in which layer of the OSI model?
A : Appliation layer
B : Transport layer
C : Network layer
D : Datalink layer

Answer:- D : Datalink layer

Q.no 3. Which of the following address belongs class A?
A : 121.12.12.248
B : 130.12.12.248
C : 128.12.12.248
D : 129.12.12.248

Answer:- A : 121.12.12.248

Q.no 4. _____ is the multiplexing technique that shifts each signal to a different
carrier frequency.
A : FDM
B : TDM
C : Both FDM & TDM
D : PDM

Answer:- A : FDM

Q.no 5. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same netmask N. Which of the
values of N given below should not be used if A and B should belong to the same network?
A : 255.255.255.0
B : 255.255.255.128
C : 255.255.255.192
D : 255.255.255.224

Answer:- D : 255.255.255.224

Q.no 6. What does Router do in a network?
A : Forwards a packet to all outgoing links
B : Forwards a packet to the next free outgoing link
C : Determines on which outing link a packet is to be forwarded
D : Forwards a packet to all outgoing links except the originated link

Answer:- C : Determines on which outing link a packet is to be forwarded

Q.no 7. In sliding window protocol, the send window can slide one or more slots when valid ____ arrives.
A : bit
B : request
C : flag
D : acknowledgement

Answer:- D : acknowledgement

Q.no 8. Which Strategies used by CSMA with collision avoidance
A : 1500 bytes , 46 bytes
B : 46 bytes, 1500 bytes
C : 64 bytes, 1518 bytes
D : 512 bits, 12144 bytes

Answer:- B : 46 bytes, 1500 bytes

Q.no 9. In byte stuffing (or character stuffing), a special byte known as _____ is added to the data section of the frame when there is a character with the same
pattern as the flag.
A : excuse character
B : entry character
C : exit character
D : escape character

Answer:- D : escape character

Computer Networking and security (CN&S) important MCQ's for preparing exams - Part 2

Q.no 10. ARQ stands for _____
A : Automatic repeat request
B : Automatic repeat quantization
C : Acknowledgement repeat request
D : Automatic resend request

Answer:- A : Automatic repeat request

Q.no 11. Which one of the following is not correct?
A : RTCP provides canonical end-point identifiers to all session participants
B : RTCP reports are expected to be sent by all participants
C : RTCP itself does not provide any flow encryption or authentication methods
D : RTCP handles the actual data delivery

Answer:- D : RTCP handles the actual data delivery

Q.no 12. In File Transfer Protocol, data transfer cannot be done in __________
A : stream mode
B : block mode
C : compressed mode
D : message mode

Answer:- D : message mode

Q.no 13. In the network HTTP resources are located by __________
A : Uniform resource identifier
B : Unique resource locator
C : Unique resource identifier
D : Union resource locator

Answer:- A : Uniform resource identifier

Q.no 14. In HDLC which frames are used to transport user data and control
information relating to user data (piggybacking)?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame

Answer:- B : I-Frames

Q.no 15. In FTP protocol, client contacts server using ____ as the transport protocol.
A : transmission control protocol
B : user datagram protocol
C : datagram congestion control protocol
D : stream control transmission protocol

Answer:- A : transmission control protocol

Q.no 16. How many different type of server exist?
A : Only one
B : Two
C : Three
D : Four

Answer:- D : Four

Q.no 17. Which one of the following is not an application layer protocol?
A : media gateway protocol
B : dynamic host configuration protocol
C : resource reservation protocol
D : session initiation protocol

Answer:- C : resource reservation protocol

Q.no 18. What is the use of Ping command?
A : To test a device on the network is reachable
B : To test a hard disk fault
C : To test a bug in a Application
D : To test a Pinter Quality

Answer:- A : To test a device on the network is reachable

Q.no 19. Which of the following layer of OSI model also called end-to-end layer?
A : Presentation layer
B : Network layer
C : Session layer
D : Transport layer

Answer:- D : Transport layer

Q.no 20. The frame transmission and collision detection is a continuous process which method is used for this condition
A : Idle,Captured the channel and sending its Frame, collision detection
B : Captured the channel and sending its Frame,Idle, collision detection
C : Idle, collision detection,Captured the channel and sending its Frame
D : Captured the channel and sending its Frame, collision detection,Idle

Answer:- B : Captured the channel and sending its Frame,Idle, collision detection

Check this quiz also very helpful for preparing your interviews and exams in CN&S 




Publish Your Great Work

Your AD here