adplus-dvertising

MCQ in Computer Network and Networking Part 4 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 4 | ECE Board Exam

This is the Multiple Choice Questions Part 4 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself in each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 4 of the Series

MCQ in Computer Network and Networking Part 3 | ECE Board Exam

Choose the letter of the best answer in each question.

151. Internet access by transmitting digital data over the wires of a local telephone network is provided by

A. leased line

B. digital subscriber line

C. digital signal line

D. none of the mentioned

View Answer:

Answer: Option B

Explanation:

152. ISP exchanges internet traffic between their networks by

A. internet exchange point

B. subscriber end point

C. isp end point

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

153. Which one of the following protocols is not used in internet?

A. http

B. dhcp

C. dns

D. none of the mentioned

View Answer:

Answer: Option D

Explanation:

154. IPv6 addressed have a size of

A. 32 bits

B. 64 bits

C. 128 bits

D. 265 bits

View Answer:

Answer: Option C

Explanation:

155. Internet works on

A. packet switching

B. circuit switching

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

156. Which one of the following is not an application layer protocol used in internet?

A. remote procedure call

B. internet relay chat

C. resource reservation protocol

D. none of the mentioned

View Answer:

Answer: Option C

Explanation:

157. Which protocol assigns IP address to the client connected in the internet?

A. dhcp

B. ip

C. rpc

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

158. Which one of the following is not used in media access control?

A. ethernet

B. digital subscriber line

C. fiber distributed data interface

D. none of the mentioned

View Answer:

Answer: Option D

Explanation:

159. In cryptography, what is cipher?

A. algorithm for performing encryption and decryption

B. encrypted message

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

160. In asymmetric key cryptography, the private key is kept by

A. sender

B. receiver

C. sender and receiver

D. all the connected devices to the network

View Answer:

Answer: Option B

Explanation:

161. Which one of the following algorithms is not used in asymmetric key cryptography?

A. rsa algorithm

B. Diffie Hellman algorithm

C. electronic code book algorithm

D. none of the mentioned

View Answer:

Answer: Option C

Explanation:

162. In cryptography, the order of the letters in a message is rearranged by

A. transpositional ciphers

B. substitution ciphers

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

163. What is data encryption standard (DES)?

A. block cipher

B. stream cipher

C. bit cipher

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

164. Cryptanalysis is used

A. to find some insecurity in a cryptographic scheme

B. to increase the speed

C. to encrypt the data

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

165. Which one of the following is a cryptographic protocol used to secure HTTP connection?

A. stream control transmission protocol (sctp)

B. transport layer security (tsl)

C. explicit congestion notification (ecn)

D. resource reservation protocol

View Answer:

Answer: Option B

Explanation:

166. Voice privacy in GSM cellular telephone protocol is provided by

A. a5/2 cipher

B. b5/4 cipher

C. b5/6 cipher

D. b5/8 cipher

View Answer:

Answer: Option A

Explanation:

167. ElGamal encryption system is

A. symmetric key encryption algorithm

B. asymmetric key encryption algorithm

C. not an encryption algorithm

D. none of the mentioned

View Answer:

Answer: Option B

Explanation:

168. Cryptographic hash function takes an arbitrary block of data and returns

A. fixed size bit string

B. variable size bit string

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

169. The attackers a network of compromised devices known as

A. internet

B. botnet

C. telnet

D. d-net

View Answer:

Answer: Option B

Explanation:

170. Which of the following is a form of DoS attack?

A. vulnerability attack

B. bandwidth flooding

C. connection flooding

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

171. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

A. vulnerability attack

B. bandwidth flooding

C. connection flooding

D. all of the mentioned

View Answer:

Answer: Option C

Explanation:

172. The DoS attack is which the attacker sends deluge of packets to the targeted host

A. vulnerability attack

B. bandwidth flooding

C. connection flooding

D. all of the mentioned

View Answer:

Answer: Option B

Explanation:

173. Packet sniffers involve

A. active receiver

B. passive receiver

C. both of the mentioned

D. none of the mentioned

View Answer:

Answer: Option B

Explanation:

174. Sniffers can be deployed in

A. wired environment

B. wifi

C. ethernet lan

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

175. Firewalls are often configured to block

A. udp traffic

B. tcp traffic

C. both of the mentioned

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

176. DHCP (dynamic host configuration protocol) provides _____ to the client.

A. ip address

B. mac address

C. url

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

177. DHCP is used for

A. ipv6

B. ipv4

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option C

Explanation:

178. The DHCP server

A. maintains a database of available ip addresses

B. maintains the information about client configuration parameters

C. grants a ip address when receives a request from a client

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

179. IP assigned for a client by DHCP server is

A. for a limited period

B. for unlimited period

C. not time dependent

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

180. DHCP uses UDP port ____ for sending data to the server.

A. 66

B. 67

C. 68

D. 69

View Answer:

Answer: Option B

Explanation:

181. The DHCP server can provide the _______ of the IP addresses.

A. dynamic allocation

B. automatic allocation

C. static allocation

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

182. DHCP client and servers on the same subnet communicate via

A. udp broadcast

B. udp unicast

C. tcp broadcast

D. tcp unicast

View Answer:

Answer: Option A

Explanation:

183. After obtaining the IP address, to prevent the IP conflict the client may use

A. internet relay chat

B. broader gateway protocol

C. address resolution protocol

D. none of the mentioned

View Answer:

Answer: Option C

Explanation:

184. What is DHCP snooping?

A. techniques applied to ensure the security of an existing dhcp infrastructure

B. encryption of the dhcp server requests

C. algorithm for dhcp

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

185. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

A. mac address

B. ip address

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option C

Explanation:

186. Real-time transport protocol (RTP) is mostly used in

A. streaming media

B. video teleconference

C. television services

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

187. RTP is used to

A. carry the media stream

B. monitor transmission statistics of streams

C. monitor quality of service of streams

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

188. RTP provides the facility of jitter ____ .

A. compensation

B. expansion

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

189. Which protocol provides the synchronization between media streams?

A. rtp

B. rtcp

C. rpc

D. none of the mentioned

View Answer:

Answer: Option B

Explanation:

190. An RTP session is established for

A. each media stream

B. all media streams

C. some predefined number of media streams

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

191. RTP can use

A. unprivileged udp ports

B. stream control transmission protocol

C. datagram congestion control protocol

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

192. Which one of the following multimedia formats cannot be supported by RTP?

A. mpeg-4

B. mjpeg

C. mpeg

D. none of the mentioned

View Answer:

Answer: Option D

Explanation:

193. An RTP header has a minimum size of

A. 12 bytes

B. 16 bytes

C. 24 bytes

D. 32 bytes

View Answer:

Answer: Option A

Explanation:

194. Which one of the following is not correct?

A. rtcp provides canonical end-point identifiers to all session participants

B. rtcp reports are expected to be sent by all participants

C. both (a) and (b)

D. none of the mentioned

View Answer:

Answer: Option D

Explanation:

195. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?

A. srtp

B. rtcp

C. rcp

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

196. Ping can

A. measure round-trip time

B. report packet loss

C. report latency

D. all of the mentioned

View Answer:

Answer: Option D

Explanation:

197. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is

A. use dual-stack approach

B. tunneling

C. no solution

D. replace the system

View Answer:

Answer: Option B

Explanation:

198. Ping sweep is a part of

A. traceroute

B. nmap

C. route

D. ipconfig

View Answer:

Answer: Option B

Explanation:

199. ICMP is used in

A. ping

B. traceroute

C. ifconfig

D. both a and b

View Answer:

Answer: Option D

Explanation:

200. _____ command is used to manipulate TCP/IP routing table.

A. route

B. ipconfig

C. ifconfig

D. traceroute

View Answer:

Answer: Option A

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)