adplus-dvertising

MCQ in Computer Network and Networking Part 15 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 15 | ECE Board Exam

This is the Multiple Choice Questions Part 15 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself in each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 15 of the Series

MCQ in Computer Network and Networking Part 14 | ECE Board Exam

Choose the letter of the best answer in each question.

701. An RTP session is established for ____________

A. each media stream

B. all media streams

C. some predefined number of media streams

D. no media stream

View Answer:

Answer: Option A

Explanation:

702. RTP can use __________

A. unprivileged udp ports

B. stream control transmission protocol

C. datagram congestion control protocol

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

703. Which one of the following multimedia formats cannot be supported by RTP?

A. mpeg-4

B. mjpeg

C. mpeg

D. txt

View Answer:

Answer: Option D

Explanation:

704. An RTP header has a minimum size of _________

A. 12 bytes

B. 16 bytes

C. 24 bytes

D. 32 bytes

View Answer:

Answer: Option A

Explanation:

705. Which one of the following is not correct?

A. rtcp provides canonical end-point identifiers to all session participants

B. rtcp reports are expected to be sent by all participants

C. rtcp itself does not provide any flow encryption or authentication methods

D. rtcp handles the actual data delivery

View Answer:

Answer: Option D

Explanation:

706. An RPC (remote procedure call) is initiated by the _________

A. server

B. client

C. client after the sever

D. a third party

View Answer:

Answer: Option B

Explanation:

707. In RPC, while a server is processing the call, the client is blocked ________

A. unless the client sends an asynchronous request to the server

B. unless the call processing is complete

C. for the complete duration of the connection

D. unless the server is disconnected

View Answer:

Answer: Option A

Explanation:

708. A remote procedure call is _______

A. inter-process communication

B. a single process

C. a single thread

D. a single stream

View Answer:

Answer: Option A

Explanation:

709. RPC allows a computer program to cause a subroutine to execute in _________

A. its own address space

B. another address space

C. both its own address space and another address space

D. applications address space

View Answer:

Answer: Option B

Explanation:

710. RPC works between two processes. These processes must be ____________

A. on the same computer

B. on different computers connected with a network

C. on the same computer and also on different computers connected with a network

D. on none of the computers

View Answer:

Answer: Option C

Explanation:

711. A remote procedure is uniquely identified by _________

A. program number

B. version number

C. procedure number

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

712. An RPC application requires _________

A. specific protocol for client server communication

B. a client program

C. a server program

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

713. RPC is a _________

A. synchronous operation

B. asynchronous operation

C. time independent operation

D. channel specific operation

View Answer:

Answer: Option A

Explanation:

714. Which of the following is an advantage of anomaly detection?

A. rules are easy to define

B. custom protocols can be easily analyzed

C. the engine can scale as the rule set grows

D. malicious activity that falls within normal usage patterns is detected

View Answer:

Answer: Option C

Explanation:

715. What is the purpose of a shadow honeypot?

A. to flag attacks against known vulnerabilities

B. to help reduce false positives in a signature-based ids

C. to randomly check suspicious traffic identified by an anomaly detection system

D. to enhance the accuracy of a traditional honeypot

View Answer:

Answer: Option C

Explanation:

716. At which two traffic layers do most commercial IDSes generate signatures?

A. application layer and network layer

B. network layer and session layer

C. transport layer and application layer

D. transport layer and network layer

View Answer:

Answer: Option D

Explanation:

717. When discussing IDS/IPS, what is a signature?

A. an electronic signature used to authenticate the identity of a user on the network

B. attack-definition file

C. it refers to “normal,” baseline network behavior

D. it is used to authorize the users on a network

View Answer:

Answer: Option B

Explanation:

718. Which of the following is true of signature based IDSes?

A. they alert administrators to deviations from “normal” traffic behavior

B. they identify previously unknown attacks

C. the technology is mature and reliable enough to use on production networks

D. they scan network traffic or packets to identify matches with attack-definition files

View Answer:

Answer: Option D

Explanation:

719. PPP provides the _______ layer in the TCP/IP suite.

A. link

B. network

C. transport

D. application

View Answer:

Answer: Option A

Explanation:

720. PPP consists of ________components

A. three (encapsulating, the domain name system)

B. three (encapsulating, a link control protocol, ncp)

C. two (a link control protocol, simple network control protocol)

D. one (simple network control protocol)

View Answer:

Answer: Option B

Explanation:

721. A Link Control Protocol (LCP) is used for ____________

A. establishing, configuring and testing the data-link connection

B. establishing and configuring different network-layer protocols

C. testing the different network-layer protocols

D. provides for multiplexing of different network-layer protocols

View Answer:

Answer: Option A

Explanation:

722. A family of network control protocols (NCPs) ____________

A. are a series of independently defined protocols that provide a dynamic

B. are a series of independently defined protocols that encapsulate

C. are a series of independently defined protocols that provide transparent

D. the same as nfs

View Answer:

Answer: Option B

Explanation:

723. Choose the correct statement from the following.

A. ppp can terminate the link at any time

B. ppp can terminate the link only during the link establishment phase

C. ppp can terminate the link during the authentication phase

D. ppp can terminate the link during the callback control phase

View Answer:

Answer: Option A

Explanation:

724. EIGRP metric is ________

A. k-values

B. bandwidth only

C. hop count

D. delay only

View Answer:

Answer: Option A

Explanation:

725. EIGRP can support ____________

A. vlsm/subnetting

B. auto summary

C. unequal cast load balancing

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

726. EIGRP sends a hello message after every ___________ seconds.

A. 5 seconds (lan), 60 seconds (wan)

B. 5 seconds (lan), 5 seconds (wan)

C. 15s

D. 180s

View Answer:

Answer: Option A

Explanation:

727. Administrative distance for internal EIGRP is ______

A. 90

B. 170

C. 110

D. 91

View Answer:

Answer: Option A

Explanation:

728. The EIGRP metric values include:

A. delay

B. bandwidth

C. mtu

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

729. For default gateway, which of following commands will you use on a Cisco router?

A. ip default network

B. ip default gateway

C. ip default route

D. default network

View Answer:

Answer: Option A

Explanation:

730. Administrative distance for external EIGRP route is _______

A. 90

B. 170

C. 110

D. 100

View Answer:

Answer: Option B

Explanation:

731. EIGRP uses the ____________ algorithm for finding shortest path.

A. spf

B. dual

C. linkstat

D. djikstra’s

View Answer:

Answer: Option B

Explanation:

732. What are the other types of OLAP apart from ROLAP?

A. HOLAP

B. MOLAP

C. DOLAP

D. Both a and b above

View Answer:

Answer: Option B

Explanation:

733. A network router joins two together?

A. Computers

B. Switches

C. Networks

D. Gateway

View Answer:

Answer: Option C

Explanation:

734. Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues.

A. True

B. False

C. none

D. other

View Answer:

Answer: Option A

Explanation:

735. Which of the following below is a loopback IP address?

A. 127.0.0.0

B. 127.0.1.1

C. 127.0.1.0

D. 127.0.0.1

View Answer:

Answer: Option D

Explanation:

736. Ping command works on which protocol?

A. ICMP

B. TCP

C. IP

D. UDP

View Answer:

Answer: Option A

Explanation:

737. Transport layer of OSI model lies between Network and layer

A. Application

B. Data link

C. Session

D. Presentation

View Answer:

Answer: Option C

Explanation:

738. Which of the following protocols below work in the application layer?

A. POP

B. PPP

C. FTP

D. Both a and d above

View Answer:

Answer: Option D

Explanation:

739. What is the port number for HTTP?

A. 25

B. 80

C. 21

D. 65

View Answer:

Answer: Option B

Explanation:

740. IP4 is more commonly used than IPv6?

A. True

B. False

C. none

D. other

View Answer:

Answer: Option A

Explanation:

741. From the options below, which suits best for MODEM?

A. a device that modulates an analog carrier signal to encode digital information

B. a device that modulates a digital carrier signal to encode analog information

C. a device that modulates an analog carrier signal to decode digital information

D. a device that modulates a digital carrier signal to decode analog information

View Answer:

Answer: Option A

Explanation:

742. What is the size of an IP address?

A. 64 bit

B. 128 bit

C. 16 bit

D. 32 bit

View Answer:

Answer: Option D

Explanation:

743. MAC addresses are also known as?

A. Hardware address

B. Physical address

C. both and b above

D. IP address

View Answer:

Answer: Option C

Explanation:

744. A network point that provides entrance into another network is called as

A. Node

B. Gateway

C. Switch

D. Router

View Answer:

Answer: Option B

Explanation:

745. UDP is an unreliable protocol.

A. True

B. False

C. none

D. other

View Answer:

Answer: Option A

Explanation:

746. A stream socket provides communications between a client and a server

A. One way

B. Two way

C. none

D. other

View Answer:

Answer: Option B

Explanation:

747. Token Ring is a data link technology for?

A. WAN

B. MAN

C. LAN

D. both a and b above

View Answer:

Answer: Option C

Explanation:

748. Which of the following protocol below are suited for email retrieval?

A. POP3

B. IMAP

C. FTP

D. Both and b above

View Answer:

Answer: Option D

Explanation:

749. TELNET used protocol for data connection

A. TCP

B. UDP

C. IP

D. DHCP

View Answer:

Answer: Option A

Explanation:

750. 10Base5, 10Base2, 10BaseT are types of?

A. Internet

B. LAN

C. Ethernet

D. Cables

View Answer:

Answer: Option C

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)