adplus-dvertising

MCQ in Computer Network and Networking Part 13 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 13 | ECE Board Exam

This is the Multiple Choice Questions Part 13 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself with each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 13 of the Series

MCQ in Computer Network and Networking Part 12 | ECE Board Exam

Choose the letter of the best answer in each question.

601. Next-Hop Method is used to reduce the contents of a _________

A. revolving table

B. rotating table

C. routing table

D. re-allocate table

View Answer:

Answer: Option C

Explanation:

602. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________

A. graph

B. tree

C. network

D. link

View Answer:

Answer: Option A

Explanation:

603. RPF stands for __________

A. reverse path forwarding

B. reverse path failure

C. reverse packet forwarding

D. reverse protocol failure

View Answer:

Answer: Option A

Explanation:

604. LSP stands for __________

A. link stable packet

B. link state packet

C. link state protocol

D. link state path

View Answer:

Answer: Option B

Explanation:

605. Network layer firewall works as a ________

A. frame filter

B. packet filter

C. signal filter

D. content filter

View Answer:

Answer: Option B

Explanation:

606. Network layer firewall has two sub-categories called ____________

A. stateful firewall and stateless firewall

B. bit-oriented firewall and byte-oriented firewall

C. frame firewall and packet firewall

D. network firewall and data firewall

View Answer:

Answer: Option A

Explanation:

607. WPA2 is used for security in _______

A. ethernet

B. Bluetooth

C. wi-fi

D. e-mail

View Answer:

Answer: Option C

Explanation:

608. Open Shortest Path First (OSPF) is also called as _____________

A. link state protocol

B. error-correction protocol

C. routing information protocol

D. border gateway protocol

View Answer:

Answer: Option A

Explanation:

609. The computation of the shortest path in OSPF is usually done by ____________

A. bellman-ford algorithm

B. routing information protocol

C. Dijkstra’s algorithm

D. distance vector routing

View Answer:

Answer: Option C

Explanation:

610. In OSPF, which protocol is used to discover neighbor routers automatically?

A. link state protocol

B. error-correction protocol

C. routing information protocol

D. hello protocol

View Answer:

Answer: Option D

Explanation:

611. Which of the following is not a type of OSPF packet?

A. hello

B. link-state request

C. link-state response

D. link-state ack

View Answer:

Answer: Option C

Explanation: The five types of OSPF packets are: Hello, Database description, Linkstate request, Link-state update, and Link-state ACK. There is no Link-state response packet; the neighbor router sends a Link-state update packet as a response to the Linkstate request packet if there is an update in the routing table.

612. In OSPF header, which field is used to detect errors in the packet?

A. type

B. area id

C. authentication type

D. checksum

View Answer:

Answer: Option D

Explanation: The checksum field is used to detect errors. It makes sure that the data portions that are being sent are all in integrity. It can detect duplicated bits. Once an error is detected, the sender has to re-transmit the data as it won’t receive an acknowledgment.

613. The outcome of Dijkstra’s calculation is used to populate the __________

A. topology table

B. routing table

C. neighbor table

D. adjacency table

View Answer:

Answer: Option  B

Explanation:

614. What is the IP protocol number for OSPF packets?

A. 89

B. 86

C. 20

D. 76

View Answer:

Answer: Option A

Explanation:

615. Which packet is NOT an OSPF packet type?

A. lsu

B. lsr

C. dbd

D. query

View Answer:

Answer: Option D

Explanation:

616. Which multicast address does the OSPF Hello protocol use?

A. 224.0.0.5

B. 224.0.0.6

C. 224.0.0.7

D. 224.0.0.8

View Answer:

Answer: Option A

Explanation:

617. DBD packets are involved during which two states?

A. exstart and exchange

B. loading and two-way

C. init and full

D. down and loading

View Answer:

Answer: Option A

Explanation:

618. At which interval does OSPF refresh LSAs?

A. 10 seconds

B. 30 seconds

C. 30 minutes

D. 1 hour

View Answer:

Answer: Option D

Explanation:

619. Which field is NOT a field within an OSPF packet header?

A. packet length

B. router id

C. authentication type

D. maxage time

View Answer:

Answer: Option D

Explanation:

620. Which two commands are required for basic OSPF configuration?

A. “[network mask] area [area-id]” and “router ospf [process-id]”

B. “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]”

C. only “router ospf [process-id]”

D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”

View Answer:

Answer: Option D

Explanation:

621. Which OSPF show command describes a list of OSPF adjacencies?

A. show ip ospf interface

B. show ip ospf

C. show ip route

D. show ip ospf neighbor

View Answer:

Answer: Option D

Explanation:

622. Datagram switching is done at which layer of OSI model?

A. network layer

B. physical layer

C. application layer

D. transport layer

View Answer:

Answer: Option A

Explanation:

623. Packets in datagram switching are referred to as ________

A. switches

B. segments

C. datagrams

D. data-packets

View Answer:

Answer: Option C

Explanation:

624. Datagrams are routed to their destinations with the help of ________

A. switch table

B. segments table

C. datagram table

D. routing table

View Answer:

Answer: Option C

Explanation:

625. The main contents of the routing table in datagram networks are ___________

A. source and destination address

B. destination address and output port

C. source address and output port

D. input port and output port

View Answer:

Answer: Option B

Explanation:

626. Which of the following is true with respect to the delay in datagram networks?

A. delay is greater than in a virtual circuit network

B. each packet may experience a wait at a switch

C. delay is not uniform for the packets of a message

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

627. Which of the following is false with respect to the datagram networks?

A. number of flows of packets are not limited

B. packets may not be in order at the destination

C. path is not reserved

D. delay is the same for all packets in a flow

View Answer:

Answer: Option D

Explanation:

628. Network layer firewall works as a __________

A. frame filter

B. packet filter

C. content filter

D. virus filter

View Answer:

Answer: Option B

Explanation:

629. Network layer firewall has two sub-categories as _________

A. state full firewall and stateless firewall

B. bit oriented firewall and byte oriented firewall

C. frame firewall and packet firewall

D. network layer firewall and session layer firewall

View Answer:

Answer: Option A

Explanation:

630. Which of the following is / are the types of firewall?

A. packet filtering firewall

B. dual homed gateway firewall

C. screen host firewall

D. dual host firewall

View Answer:

Answer: Option A

Explanation:

631. A proxy firewall filters at _________

A. physical layer

B. data link layer

C. network layer

D. application layer

View Answer:

Answer: Option D

Explanation:

632. A packet filter firewall filters at __________

A. physical layer

B. data link layer

C. network layer or transport layer

D. application layer

View Answer:

Answer: Option C

Explanation:

633. What is one advantage of setting up a DMZ with two firewalls?

A. you can control where traffic goes in three networks

B. you can do stateful packet filtering

C. you can do load balancing

D. improved network performance

View Answer:

Answer: Option C

Explanation:

634. A stateful firewall maintains a ___________ which is a list of active connections.

A. routing table

B. bridging table

C. state table

D. connection table

View Answer:

Answer: Option A

Explanation:

635. Performance management is closely related to _________

A. proactive fault management

B. fault management

C. reactive fault management

D. preventive fault management

View Answer:

Answer: Option B

Explanation:

636. Which of the following networks supports pipelining effect?

A. circuit-switched networks

B. message-switched networks

C. packet-switched networks

D. stream-switched networks

View Answer:

Answer: Option C

Explanation:

637. MIB is a collection of groups of objects that can be managed by __________

A. smtp

B. udp

C. snmp

D. tcp/ip

View Answer:

Answer: Option C

Explanation:

638. A network management system can be divided into ___________

A. three categories

B. five broad categories

C. seven broad categories

D. ten broad categories

View Answer:

Answer: Option B

Explanation:

639. Ping can _________

A. measure round-trip time

B. report packet loss

C. report latency

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

640. Ping sweep is a part of _________

A. traceroute

B. nmap

C. route

D. ipconfig

View Answer:

Answer: Option B

Explanation:

641. ICMP is used in _________

A. ping

B. traceroute

C. ifconfig

D. both ping & traceroute

View Answer:

Answer: Option D

Explanation:

642. __________ command is used to manipulate TCP/IP routing table.

A. route

B. ipconfig

C. ifconfig

D. traceroute

View Answer:

Answer: Option A

Explanation:

643. Which of the following is not related to ipconfig in Microsoft Windows?

A. display all current tcp/ip network configuration values

B. modify dhcp settings

C. modify dns settings

D. trace the routers in the path to destination

View Answer:

Answer: Option D

Explanation:

644. __________ allows checking if a domain is available for registration.

A. domain check

B. domain dossier

C. domain lookup

D. domain registers

View Answer:

Answer: Option A

Explanation:

645. Choose the wrong statement from the following.

A. nslookup is used to query a dns server for dns data

B. ping is used to check connectivity

C. pathping combines the functionality of ping with that of route

D. ifconfig can configure tcp/ip network interface parameters

View Answer:

Answer: Option C

Explanation:

646. Ethernet frame consists of ____________

A. mac address

B. ip address

C. default mask

D. network address

View Answer:

Answer: Option A

Explanation:

647. What is start frame delimiter (SFD) in ethernet frame?

A. 10101010

B. 10101011

C. 00000000

D. 11111111

View Answer:

Answer: Option B

Explanation:

648. MAC address is of ___________

A. 24 bits

B. 36 bits

C. 42 bits

D. 48 bits

View Answer:

Answer: Option D

Explanation:

649. Ethernet in metropolitan area network (MAN) can be used as ___________

A. pure ethernet

B. ethernet over sdh

C. ethernet over mpls

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

650. A point-to-point protocol over ethernet is a network protocol for __________

A. encapsulating ppp frames inside ethernet frames

B. encapsulating ehternet framse inside ppp frames

C. for security of ethernet frames

D. for security of ppp frames

View Answer:

Answer: Option A

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)