adplus-dvertising

MCQ in Computer Network and Networking Part 16 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 16 | ECE Board Exam

This is the Multiple Choice Questions Part 16 of the Series in Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself in each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 16 of the Series

MCQ in Computer Network and Networking Part 15 | ECE Board Exam

Choose the letter of the best answer in each question.

751. The process of assigning the IP address for specific times to the various hosts by DHCP is called?

A. Lend

B. sublease

C. let

D. Lease

View Answer:

Answer: Option D

Explanation:

752. What is the full form of URL?

A. Uniform routing locator

B. Uniform Resource Locator

C. Universal Resource Locator

D. Uniform router locator

View Answer:

Answer: Option B

Explanation:

753. is a standard suite of protocols used for packet switching across computer networks.

A. x.22

B. x.23

C. x.25

D. x.26

View Answer:

Answer: Option C

Explanation:

754. What is the full form of CAN?

A. Campus Area Network

B. Cluster Area Network

C. Control Area network

D. both A and B

View Answer:

Answer: Option D

Explanation:

755. Which of the following below is/are the capability of ICMP protocol?

A. Report package count

B. Report network congestion

C. Both band d

D. Report availability of remote hosts

View Answer:

Answer: Option C

Explanation:

756. ARP works on Ethernet networks.

A. False

B. True

C. none

D. other

View Answer:

Answer: Option B

Explanation:

757. assigns a unique number to each IP network adapter called the MAC address.

A. Media Access Control

B. Metro Access Control

C. Metropolitan Access Control

D. Both B and C above

View Answer:

Answer: Option A

Explanation:

758. Piconets in the blue tooth a minimum of two and a maximum of Bluetooth peer devices.

A. five

B. eight

C. nine

D. four

View Answer:

Answer: Option B

Explanation:

759. Dynamic addressing doesn’t allow many devices to share limited address space on a network

A. True

B. False

C. none

D. other

View Answer:

Answer: Option B

Explanation:

760. NAT stands for.

A. network address transformer

B. network address translator

C. network address translation

D. Both B and C above

View Answer:

Answer: Option C

Explanation:

761. Which of the following is true for secure shell tunneling?

A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port

B. SSH tunnels provide a means to not bypass firewalls

C. All SSH clients support dynamic port forwarding

D. Both A and B

View Answer:

Answer: Option A

Explanation:

762. Which of the following below are secure VPN protocols?

A. UDP

B. TCP

C. SSTP

D. Both B and C

View Answer:

Answer: Option D

Explanation:

763. What is the difference between a switch and a hub?

A. Switches operate at the physical layer while hubs operate at the data link layer

B. Switches operate at the data link layer while hubs operate at the transport layer

C. Switches operate at the data link layer while hubs operate at the physical layer

D. Switches operate at the transport layer while hubs operate at the physical layer

View Answer:

Answer: Option C

Explanation:

764. When computers in a network listen and receive the signal, it is termed as active topology

A. True

B. False

C. none

D. other

View Answer:

Answer: Option A

Explanation:

765. In 10base2, 10base5, what do 2 and 5 stand for?

A. Speed in Mbps

B. Number of segments

C. Length of segment

D. Size of segment

View Answer:

Answer: Option B

Explanation:

766. is added to data packet for error detection.

A. checksum bit

B. error bit

C. parity bit

D. other

View Answer:

Answer: Option C

Explanation:

767. ALL IP addresses are divided into a network address and host address

A. True

B. False

C. none

D. other

View Answer:

Answer: Option A

Explanation:

768. How can we examine the current routing tables in command prompt?

A. using route start

B. using net start

C. using net stat

D. either a or b

View Answer:

Answer: Option C

Explanation:

769. Both ping and tracer are used to find If the computer is in the network.

A. True

B. False

C. none

D. other

View Answer:

Answer: Option B

Explanation:

770. What is the difference between ring and bus topology?

A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable

B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable

C. In the bus, all nodes are connected with another in a loop while instar they are connected to a centralbnode

D. In Bus all nodes are connected with another loop while instar they are connected to a central cable

View Answer:

Answer: Option A

Explanation:

771. MAC addressing works in data link layer while IP addressing works in the network layer.

A. True

B. False

C. none

D. other

View Answer:

Answer: Option A

Explanation:

772. A packet whose destination is outside the local TCP/IP network segment is sent to the ______.

A. File server

B. Default gateway

C. DNS server

D. DHCP server

View Answer:

Answer: Option B

Explanation:

773. Why was the OSI model developed?

A. manufacturers disliked the TCP/IP protocol suite

B. the rate of data transfer was increasing exponentially

C. standards were needed to allow any two systems to communicate

D. none of the above

View Answer:

Answer: Option C

Explanation:

774. Which piece of information is not vital for a computer in a TCP/IP network?

A. IP address

B. Default gateway

C. Subnet Mask

D. DNS server

View Answer:

Answer: Option D

Explanation:

775. The physical layer is concerned with the movement of over the physical medium.

A. programs

B. dialogs

C. protocols

D. Bits

View Answer:

Answer: Option D

Explanation:

776. Which protocol below operates at the network layer in the OSI model?

A. IP

B. ICMP

C. RARP

D. All of the above

View Answer:

Answer: Option D

Explanation:

777. In the OSI model, as a data packet moves from the lower to the upper layers, headers are.

A. added

B. removed

C. rearranged

D. Modified

View Answer:

Answer: Option B

Explanation:

778. Session layer of the OSI model provides

A. Data representation

B. Dialog control

C. Remote job execution

D. Creating logical connections

View Answer:

Answer: Option B

Explanation:

779. IPv6 has -bit addresses.

A. 32

B. 64

C. 128

D. Variable

View Answer:

Answer: Option C

Explanation:

780. Which one of the following functionalities aren’t provided by TCP?

A. Flow control

B. Addressing

C. Retransmission of packets as required

D. Proper sequencing of the packets

View Answer:

Answer: Option B

Explanation:

781. Which of the following can be an Ethernet physical address?

A. 01:02:01:2C:4B

B. 07:01:02:01:2C:4B:2C

C. 07:01:02:01:2C:4B

D. none of the above

View Answer:

Answer: Option C

Explanation:

782. An IP address contains bits?

A. 8

B. 16

C. 32

D. 64

View Answer:

Answer: Option C

Explanation:

783. Which routing protocol below is used by exterior routers between the autonomous systems?

A. RIP

B. IGRP

C. OSPF

D. BGP

View Answer:

Answer: Option D

Explanation:

784. Which of the IP headers decides when the packet should be discarded?

A. Fragment control

B. TTL

C. Checksum

D. Header length

View Answer:

Answer: Option B

Explanation:

785. Which IP address is reserved for software loop-back?

A. 224.x.x.x

B. 127.x.x.x

C. 0.0.0.0

D. 255.255.255.255

View Answer:

Answer: Option B

Explanation:

786. What is the network ID for a computer whose IP address is190.148.64.23?

A. 190

B. 190.148

C. 190.148.64

D. None of the above

View Answer:

Answer: Option B

Explanation:

787. Which port is reserved for use of the SMTP protocol?

A. 21

B. 23

C. 25

D. 53

View Answer:

Answer: Option C

Explanation:

788. Which one of the followings is a connectionless protocol?

A. UDP

B. Ethernet

C. IPX

D. All of the above

View Answer:

Answer: Option D

Explanation:

789. Which application below uses the UDP protocol?

A. DNS

B. TFTP

C. RIP

D. All of the above

View Answer:

Answer: Option C

Explanation:

790. How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of255.255.255.192?

A. 62

B. 126

C. 192

D. 254

View Answer:

Answer: Option A

Explanation:

791. Which of the followings is not a direct implication of subnet masks in TCP/IP networks?

A. Reduce network traffic

B. Increase network security

C. Assignment of more IP addresses

D. Better network management

View Answer:

Answer: Option C

Explanation:

792. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are

A. Added

B. Removed

C. Rearranged

D. Modified

View Answer:

Answer: Option A

Explanation:

793. The structure or format of data is called

A. Syntax

B. Semantics

C. Struct

D. Formatting

View Answer:

Answer: Option A

Explanation:

794. Communication between a computer and a keyboard involves transmission.

A. Automatic

B. Half-duplex

C. Full-duplex

D. Simplex

View Answer:

Answer: Option D

Explanation:

795. The first Network was called

A. CNNET

B. NSFNET

C. ASAPNET

D. ARPANET

View Answer:

Answer: Option D

Explanation:

796. A set of rules that governs data communication.

A. Protocols

B. Standards

C. RFCs

D. Servers

View Answer:

Answer: Option A

Explanation:

797. Communication channel is shared by all the machines on the networking

A. Broadcast network

B. Unicast network

C. Multicast network

D. Anycast network

View Answer:

Answer: Option A

Explanation:

798. A is a device that forwards packets between networks by processing the routing information included in the packet.

A. Bridge

B. Firewall

C. Router

D. Hub

View Answer:

Answer: Option C

Explanation:

799. Network congestion occurs

A. In case of traffic overloading

B. When a system terminates

C. When connection between two nodes terminates

D. In case of transfer failure

View Answer:

Answer: Option A

Explanation:

800. Which of the following networks extends a private network across public networks?

A. Local area network

B. Virtual private network

C. Enterprise private network

D. Storage area network

View Answer:

Answer: Option B

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)