adplus-dvertising

MCQ in Computer Network and Networking Part 17 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 17 | ECE Board Exam

This is the Multiple Choice Questions Part 17 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself in each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 17 of the Series

MCQ in Computer Network and Networking Part 16 | ECE Board Exam

Choose the letter of the best answer in each question.

801. The number of layers in ISO OSI reference model is

A. 5

B. 7

C. 6

D. 10

View Answer:

Answer: Option B

Explanation:

802. Which of the following layers is an addition to OSI model when compared with TCP IP model?

A. Application layer

B. Presentation layer

C. Session layer

D. Session and Presentation layer

View Answer:

Answer: Option D

Explanation:

803. The functionalities of the presentation layer include

A. Data compression

B. Data encryption

C. Data description

D. All of the mentioned

View Answer:

Answer: Option D

Explanation:

804. Delimiting and synchronization of data exchange is provided by

A. Application layer

B. Session layer

C. Transport layer

D. Link layer

View Answer:

Answer: Option B

Explanation:

805. In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is

A. Application layer

B. Transport layer

C. Link layer

D. Session layer

View Answer:

Answer: Option D

Explanation:

806. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is

A. Application layer

B. Transport layer

C. Link layer

D. Session layer

View Answer:

Answer: Option A

Explanation:

807. Which layer is used to link the network support layers and user support layers?

A. Session layer

B. Data link layer

C. Transport layer

D. Network layer

View Answer:

Answer: Option C

Explanation:

808. OSI stands for

A. Open system interconnection

B. Operating system interface

C. Optical service implementation

D. Open service Internet

View Answer:

Answer: Option A

Explanation:

809. Which Project 802 standard provides for a collision-free protocol?

A. 802.2

B. 802.3

C. 802.5

D. 802.6

View Answer:

Answer: Option C

Explanation:

810. The protocol data unit (PDU) for the application layer in the Internet stack is

A. Segment

B. Datagram

C. Message

D. Frame

View Answer:

Answer: Option C

Explanation:

811. What is a Firewall in Computer Network?

A. The physical boundary of Network

B. An operating System of Computer Network

C. A system designed to prevent unauthorized access

D. A web browsing Software

View Answer:

Answer: Option C

Explanation:

812. Which of the following services is not provided by wireless access point in 802.11 WLAN?

A. Association

B. Disassociation

C. Error correction

D. Integration

View Answer:

Answer: Option C

Explanation:

813. Bridge works in which layer of the OSI model?

A. Application layer

B. Transport layer

C. Network layer

D. Data link layer

View Answer:

Answer: Option D

Explanation:

814. Why IP Protocol is considered as unreliable?

A. A packet may be lost

B. Packets may arrive out of order

C. Duplicate packets may be generated

D. All of the above

View Answer:

Answer: Option D

Explanation:

815. What are the uses of subnetting?

A. It divides one large network into several smaller ones

B. It divides network into network classes

C. It speeds up the speed of network

D. None of above

View Answer:

Answer: Option A

Explanation:

816. The Internet is an example of

A. Cell switched network

B. circuit switched network

C. Packet switched network

D. All of above

View Answer:

Answer: Option C

Explanation:

817. What does protocol defines?

A. Protocol defines what data is communicated.

B. Protocol defines how data is communicated.

C. Protocol defines when data is communicated.

D. All of these

View Answer:

Answer: Option D

Explanation:

818. What is the use of Ping command?

A. To test a device on the network is reachable

B. To test a hard disk fault

C. To test a bug in an Application

D. To test a Pinter Quality

View Answer:

Answer: Option A

Explanation:

819. What is the Demilitarized Zone?

A. The area between firewall & connection to an external network

B. The area between ISP to Military area

C. The area surrounded by secured servers

D. The area surrounded by the Military

View Answer:

Answer: Option A

Explanation:

820. The combination of an IP address and a port number is known as.

A. network number

B. socket address

C. subnet mask number

D. MAC address

View Answer:

Answer: Option B

Explanation:

821. Which of the following is reliable communication?

A. TCP

B. IP

C. UPD

D. All of them

View Answer:

Answer: Option A

Explanation:

822. What is the size of Host bits in Class B of IP address?

A. 04

B. 08

C. 16

D. 32

View Answer:

Answer: Option C

Explanation:

823. Which of the following is not associated with the session layer?

A. Dialog control

B. Token management

C. Semantics of the information transmitted

D. Synchronization

View Answer:

Answer: Option C

Explanation:

824. The Internet Control Message Protocol (ICMP)

A. allows gateways to send error a control messages to other gateways or hosts

B. provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another

C. reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem

D. All of the above

View Answer:

Answer: Option A

Explanation:

825. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

A. Modem

B. Cable

C. Hub

D. Router

View Answer:

Answer: Option D

Explanation:

826. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

A. FTP

B. SNMP

C. SMTP

D. RPC

View Answer:

Answer: Option C

Explanation:

827. Which of the following device is used to connect two systems, especially if the systems use different protocols?

A. hub

B. bridge

C. gateway

D. repeater

View Answer:

Answer: Option C

Explanation:

828. can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code

B. CRC

C. VRC

D. None of the above

View Answer:

Answer: Option B

Explanation:

829. The PSTN is an example of a ________ network.

A. packet switched

B. circuit switched

C. message switched

D. None of these

View Answer:

Answer: Option B

Explanation:

830. When and where RARP is used intentionally or effectively?

A. At the time of network booting where no space to store IP address (or diskless network) for address resolution.

B. In broadcasting to get IP address of Network.

C. To get the access in private network whenever it is required.

D. None of the above.

View Answer:

Answer: Option A

Explanation:

831. Which one of the following routing algorithms can be used for network layer design?

A. shortest path algorithm

B. distance vector routing

C. link state routing

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

832. A subset of a network that includes all the routers but contains no loops is called:

A. spanning tree

B. spider structure

C. spider tree

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

833. ICMP is primarily used for:

A. error and diagnostic functions

B. addressing

C. forwarding

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

834. User datagram protocol is called connectionless because:

A. all UDP packets are treated independently by transport layer

B. it sends data as a stream of related packets

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

835. An endpoint of an inter-process communication flow across a computer network is called:

A. socket

B. pipe

C. port

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

836. A is a TCP name for a transport service access point.

A. port

B. pipe

C. node

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

837. Which one of the following is a transport layer protocol?

A. stream control transmission protocol

B. internet control message protocol

C. neighbor discovery protocol

D. dynamic host configuration protocol

View Answer:

Answer: Option A

Explanation:

838. Physical layer provides:

A. mechanical specifications of electrical connectors and cables

B. electrical specification of transmission line signal level

C. specification for IR over optical fiber

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

839. The translates internet domain and host names to IP address.

A. domain name system

B. routing information protocol

C. network time protocol

D. internet relay chat

View Answer:

Answer: Option A

Explanation:

840. When displaying a web page, the application layer uses the:

A. HTTP protocol

B. FTP protocol

C. SMTP protocol

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

841. This is a time-sensitive service:

A. File transfer

B. File download

C. E-mail

D. Internet telephony

View Answer:

Answer: Option D

Explanation:

842. Packet sniffers involve:

A. Active receiver

B. Passive receiver

C. Both of the mentioned

D. None of the mentioned

View Answer:

Answer: Option B

Explanation:

843. Identify the incorrect statement:

A. FTP stands for File Transfer Protocol

B. FTP uses two parallel TCP connections

C. FTP sends its control information in-band

D. FTP sends exactly one file over the data connection

View Answer:

Answer: Option C

Explanation:

844. If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:

A. 5

B. 10

C. 2

D. 6

View Answer:

Answer: Option D

Explanation:

845. Find the FTP reply whose message is wrongly matched:

A. 331 – Username OK, password required

B. 425 – Can’t open data connection

C. 452 – Error writing file

D. 452 – Can’t open data connection

View Answer:

Answer: Option D

Explanation:

846. In an Ethernet local area network, which one of the following statements is True?

A. A station stops to sense the channel once it starts transmitting a frame.

B. The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size.

C. A station continues to transmit the packet even after the collision is detected.

D. The exponential back off mechanism reduces the probability of collision on retransmissions

View Answer:

Answer: Option D

Explanation:

847. The first Network:

A. CNNET

B. NSFNET

C. ASAPNET

D. ARPANET

View Answer:

Answer: Option D

Explanation:

848. Which organization has authority over interstate and international commerce in the communications field?

A. ITU-T

B. IEEE

C. FCC

D. ISOC

View Answer:

Answer: Option C

Explanation:

849. Baud rate is:

A. number of signal changes per second

B. number of bits per second

C. number of bytes per second

D. number of ASCII characters per second

View Answer:

Answer: Option A

Explanation:

850. The slowest transmission speeds are those of

A. Coaxial cable

B. Twisted pair wire

C. Fiber-optic cable

D. Microwave

View Answer:

Answer: Option B

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)