
This is the Multiple Choice Questions Part 15 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself in each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.
Continue Practice Exam Test Questions Part 15 of the Series
⇐ MCQ in Computer Network and Networking Part 14 | ECE Board Exam
Choose the letter of the best answer in each question.
701. An RTP session is established for ____________
A. each media stream
B. all media streams
C. some predefined number of media streams
D. no media stream
Answer: Option A
Explanation:
702. RTP can use __________
A. unprivileged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer: Option D
Explanation:
703. Which one of the following multimedia formats cannot be supported by RTP?
A. mpeg-4
B. mjpeg
C. mpeg
D. txt
Answer: Option D
Explanation:
704. An RTP header has a minimum size of _________
A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer: Option A
Explanation:
705. Which one of the following is not correct?
A. rtcp provides canonical end-point identifiers to all session participants
B. rtcp reports are expected to be sent by all participants
C. rtcp itself does not provide any flow encryption or authentication methods
D. rtcp handles the actual data delivery
Answer: Option D
Explanation:
706. An RPC (remote procedure call) is initiated by the _________
A. server
B. client
C. client after the sever
D. a third party
Answer: Option B
Explanation:
707. In RPC, while a server is processing the call, the client is blocked ________
A. unless the client sends an asynchronous request to the server
B. unless the call processing is complete
C. for the complete duration of the connection
D. unless the server is disconnected
Answer: Option A
Explanation:
708. A remote procedure call is _______
A. inter-process communication
B. a single process
C. a single thread
D. a single stream
Answer: Option A
Explanation:
709. RPC allows a computer program to cause a subroutine to execute in _________
A. its own address space
B. another address space
C. both its own address space and another address space
D. applications address space
Answer: Option B
Explanation:
710. RPC works between two processes. These processes must be ____________
A. on the same computer
B. on different computers connected with a network
C. on the same computer and also on different computers connected with a network
D. on none of the computers
Answer: Option C
Explanation:
711. A remote procedure is uniquely identified by _________
A. program number
B. version number
C. procedure number
D. all of the mentioned
Answer: Option D
Explanation:
712. An RPC application requires _________
A. specific protocol for client server communication
B. a client program
C. a server program
D. all of the mentioned
Answer: Option D
Explanation:
713. RPC is a _________
A. synchronous operation
B. asynchronous operation
C. time independent operation
D. channel specific operation
Answer: Option A
Explanation:
714. Which of the following is an advantage of anomaly detection?
A. rules are easy to define
B. custom protocols can be easily analyzed
C. the engine can scale as the rule set grows
D. malicious activity that falls within normal usage patterns is detected
Answer: Option C
Explanation:
715. What is the purpose of a shadow honeypot?
A. to flag attacks against known vulnerabilities
B. to help reduce false positives in a signature-based ids
C. to randomly check suspicious traffic identified by an anomaly detection system
D. to enhance the accuracy of a traditional honeypot
Answer: Option C
Explanation:
716. At which two traffic layers do most commercial IDSes generate signatures?
A. application layer and network layer
B. network layer and session layer
C. transport layer and application layer
D. transport layer and network layer
Answer: Option D
Explanation:
717. When discussing IDS/IPS, what is a signature?
A. an electronic signature used to authenticate the identity of a user on the network
B. attack-definition file
C. it refers to “normal,” baseline network behavior
D. it is used to authorize the users on a network
Answer: Option B
Explanation:
718. Which of the following is true of signature based IDSes?
A. they alert administrators to deviations from “normal” traffic behavior
B. they identify previously unknown attacks
C. the technology is mature and reliable enough to use on production networks
D. they scan network traffic or packets to identify matches with attack-definition files
Answer: Option D
Explanation:
719. PPP provides the _______ layer in the TCP/IP suite.
A. link
B. network
C. transport
D. application
Answer: Option A
Explanation:
720. PPP consists of ________components
A. three (encapsulating, the domain name system)
B. three (encapsulating, a link control protocol, ncp)
C. two (a link control protocol, simple network control protocol)
D. one (simple network control protocol)
Answer: Option B
Explanation:
721. A Link Control Protocol (LCP) is used for ____________
A. establishing, configuring and testing the data-link connection
B. establishing and configuring different network-layer protocols
C. testing the different network-layer protocols
D. provides for multiplexing of different network-layer protocols
Answer: Option A
Explanation:
722. A family of network control protocols (NCPs) ____________
A. are a series of independently defined protocols that provide a dynamic
B. are a series of independently defined protocols that encapsulate
C. are a series of independently defined protocols that provide transparent
D. the same as nfs
Answer: Option B
Explanation:
723. Choose the correct statement from the following.
A. ppp can terminate the link at any time
B. ppp can terminate the link only during the link establishment phase
C. ppp can terminate the link during the authentication phase
D. ppp can terminate the link during the callback control phase
Answer: Option A
Explanation:
724. EIGRP metric is ________
A. k-values
B. bandwidth only
C. hop count
D. delay only
Answer: Option A
Explanation:
725. EIGRP can support ____________
A. vlsm/subnetting
B. auto summary
C. unequal cast load balancing
D. all of the mentioned
Answer: Option D
Explanation:
726. EIGRP sends a hello message after every ___________ seconds.
A. 5 seconds (lan), 60 seconds (wan)
B. 5 seconds (lan), 5 seconds (wan)
C. 15s
D. 180s
Answer: Option A
Explanation:
727. Administrative distance for internal EIGRP is ______
A. 90
B. 170
C. 110
D. 91
Answer: Option A
Explanation:
728. The EIGRP metric values include:
A. delay
B. bandwidth
C. mtu
D. all of the mentioned
Answer: Option D
Explanation:
729. For default gateway, which of following commands will you use on a Cisco router?
A. ip default network
B. ip default gateway
C. ip default route
D. default network
Answer: Option A
Explanation:
730. Administrative distance for external EIGRP route is _______
A. 90
B. 170
C. 110
D. 100
Answer: Option B
Explanation:
731. EIGRP uses the ____________ algorithm for finding shortest path.
A. spf
B. dual
C. linkstat
D. djikstra’s
Answer: Option B
Explanation:
732. What are the other types of OLAP apart from ROLAP?
A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
Answer: Option B
Explanation:
733. A network router joins two together?
A. Computers
B. Switches
C. Networks
D. Gateway
Answer: Option C
Explanation:
734. Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues.
A. True
B. False
C. none
D. other
Answer: Option A
Explanation:
735. Which of the following below is a loopback IP address?
A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Answer: Option D
Explanation:
736. Ping command works on which protocol?
A. ICMP
B. TCP
C. IP
D. UDP
Answer: Option A
Explanation:
737. Transport layer of OSI model lies between Network and layer
A. Application
B. Data link
C. Session
D. Presentation
Answer: Option C
Explanation:
738. Which of the following protocols below work in the application layer?
A. POP
B. PPP
C. FTP
D. Both a and d above
Answer: Option D
Explanation:
739. What is the port number for HTTP?
A. 25
B. 80
C. 21
D. 65
Answer: Option B
Explanation:
740. IP4 is more commonly used than IPv6?
A. True
B. False
C. none
D. other
Answer: Option A
Explanation:
741. From the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analog information
Answer: Option A
Explanation:
742. What is the size of an IP address?
A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
Answer: Option D
Explanation:
743. MAC addresses are also known as?
A. Hardware address
B. Physical address
C. both and b above
D. IP address
Answer: Option C
Explanation:
744. A network point that provides entrance into another network is called as
A. Node
B. Gateway
C. Switch
D. Router
Answer: Option B
Explanation:
745. UDP is an unreliable protocol.
A. True
B. False
C. none
D. other
Answer: Option A
Explanation:
746. A stream socket provides communications between a client and a server
A. One way
B. Two way
C. none
D. other
Answer: Option B
Explanation:
747. Token Ring is a data link technology for?
A. WAN
B. MAN
C. LAN
D. both a and b above
Answer: Option C
Explanation:
748. Which of the following protocol below are suited for email retrieval?
A. POP3
B. IMAP
C. FTP
D. Both and b above
Answer: Option D
Explanation:
749. TELNET used protocol for data connection
A. TCP
B. UDP
C. IP
D. DHCP
Answer: Option A
Explanation:
750. 10Base5, 10Base2, 10BaseT are types of?
A. Internet
B. LAN
C. Ethernet
D. Cables
Answer: Option C
Explanation:
- MCQ in Computer Network and Networking Part 20 | ECE Board Exam
- MCQ in Computer Network and Networking Part 19 | ECE Board Exam
- MCQ in Computer Network and Networking Part 18 | ECE Board Exam
- MCQ in Computer Network and Networking Part 17 | ECE Board Exam
- MCQ in Computer Network and Networking Part 16 | ECE Board Exam
- MCQ in Computer Network and Networking Part 15 | ECE Board Exam
- MCQ in Computer Network and Networking Part 14 | ECE Board Exam
- MCQ in Computer Network and Networking Part 13 | ECE Board Exam
- MCQ in Computer Network and Networking Part 12 | ECE Board Exam
- MCQ in Computer Network and Networking Part 11 | ECE Board Exam
- MCQ in Computer Network and Networking Part 10 | ECE Board Exam
- MCQ in Computer Network and Networking Part 9 | ECE Board Exam
- MCQ in Computer Network and Networking Part 8 | ECE Board Exam
- MCQ in Computer Network and Networking Part 7 | ECE Board Exam
- MCQ in Computer Network and Networking Part 6 | ECE Board Exam
- MCQ in Computer Network and Networking Part 5 | ECE Board Exam
- MCQ in Computer Network and Networking Part 4 | ECE Board Exam
- MCQ in Computer Network and Networking Part 3 | ECE Board Exam
- MCQ in Computer Network and Networking Part 2 | ECE Board Exam
- MCQ in Computer Network and Networking Part 1 | ECE Board Exam
MCQ in Computer Fundamentals Series
Complete List of MCQ in Communications Engineering per topic
Complete List of MCQ in Electronics Engineering per topic
P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.
“Will you subscribe today via YOUTUBE?”
TIRED OF ADS?
- Become Premium Member and experienced fewer ads to ads-free browsing.
- Full Content Access Exclusive to Premium members
- Access to PINOYBIX FREEBIES folder
- Download Reviewers and Learning Materials Free
- Download Content: You can see download/print button at the bottom of each post.
PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:
- CIVIL ENGINEERING REVIEWER
- CIVIL SERVICE EXAM REVIEWER
- CRIMINOLOGY REVIEWER
- ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
- ELECTRICAL ENGINEERING & RME REVIEWER
- FIRE OFFICER EXAMINATION REVIEWER
- LET REVIEWER
- MASTER PLUMBER REVIEWER
- MECHANICAL ENGINEERING REVIEWER
- NAPOLCOM REVIEWER
- Additional upload reviewers and learning materials are also FREE
FOR A LIMITED TIME
If you subscribe for PREMIUM today!
You will receive an additional 1 month of Premium Membership FREE.
For Bronze Membership an additional 2 months of Premium Membership FREE.
For Silver Membership an additional 3 months of Premium Membership FREE.
For Gold Membership an additional 5 months of Premium Membership FREE.
Join the PinoyBIX community.