
This is the Multiple Choice Questions Part 4 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself in each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.
Continue Practice Exam Test Questions Part 4 of the Series
⇐ MCQ in Computer Network and Networking Part 3 | ECE Board Exam
Choose the letter of the best answer in each question.
151. Internet access by transmitting digital data over the wires of a local telephone network is provided by
A. leased line
B. digital subscriber line
C. digital signal line
D. none of the mentioned
Answer: Option B
Explanation:
152. ISP exchanges internet traffic between their networks by
A. internet exchange point
B. subscriber end point
C. isp end point
D. none of the mentioned
Answer: Option A
Explanation:
153. Which one of the following protocols is not used in internet?
A. http
B. dhcp
C. dns
D. none of the mentioned
Answer: Option D
Explanation:
154. IPv6 addressed have a size of
A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer: Option C
Explanation:
155. Internet works on
A. packet switching
B. circuit switching
C. both (a) and (b)
D. none of the mentioned
Answer: Option A
Explanation:
156. Which one of the following is not an application layer protocol used in internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. none of the mentioned
Answer: Option C
Explanation:
157. Which protocol assigns IP address to the client connected in the internet?
A. dhcp
B. ip
C. rpc
D. none of the mentioned
Answer: Option A
Explanation:
158. Which one of the following is not used in media access control?
A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. none of the mentioned
Answer: Option D
Explanation:
159. In cryptography, what is cipher?
A. algorithm for performing encryption and decryption
B. encrypted message
C. both (a) and (b)
D. none of the mentioned
Answer: Option A
Explanation:
160. In asymmetric key cryptography, the private key is kept by
A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer: Option B
Explanation:
161. Which one of the following algorithms is not used in asymmetric key cryptography?
A. rsa algorithm
B. Diffie Hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Answer: Option C
Explanation:
162. In cryptography, the order of the letters in a message is rearranged by
A. transpositional ciphers
B. substitution ciphers
C. both (a) and (b)
D. none of the mentioned
Answer: Option A
Explanation:
163. What is data encryption standard (DES)?
A. block cipher
B. stream cipher
C. bit cipher
D. none of the mentioned
Answer: Option A
Explanation:
164. Cryptanalysis is used
A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. none of the mentioned
Answer: Option A
Explanation:
165. Which one of the following is a cryptographic protocol used to secure HTTP connection?
A. stream control transmission protocol (sctp)
B. transport layer security (tsl)
C. explicit congestion notification (ecn)
D. resource reservation protocol
Answer: Option B
Explanation:
166. Voice privacy in GSM cellular telephone protocol is provided by
A. a5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer: Option A
Explanation:
167. ElGamal encryption system is
A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. none of the mentioned
Answer: Option B
Explanation:
168. Cryptographic hash function takes an arbitrary block of data and returns
A. fixed size bit string
B. variable size bit string
C. both (a) and (b)
D. none of the mentioned
Answer: Option A
Explanation:
169. The attackers a network of compromised devices known as
A. internet
B. botnet
C. telnet
D. d-net
Answer: Option B
Explanation:
170. Which of the following is a form of DoS attack?
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer: Option D
Explanation:
171. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer: Option C
Explanation:
172. The DoS attack is which the attacker sends deluge of packets to the targeted host
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer: Option B
Explanation:
173. Packet sniffers involve
A. active receiver
B. passive receiver
C. both of the mentioned
D. none of the mentioned
Answer: Option B
Explanation:
174. Sniffers can be deployed in
A. wired environment
B. wifi
C. ethernet lan
D. all of the mentioned
Answer: Option D
Explanation:
175. Firewalls are often configured to block
A. udp traffic
B. tcp traffic
C. both of the mentioned
D. none of the mentioned
Answer: Option A
Explanation:
176. DHCP (dynamic host configuration protocol) provides _____ to the client.
A. ip address
B. mac address
C. url
D. none of the mentioned
Answer: Option A
Explanation:
177. DHCP is used for
A. ipv6
B. ipv4
C. both (a) and (b)
D. none of the mentioned
Answer: Option C
Explanation:
178. The DHCP server
A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants a ip address when receives a request from a client
D. all of the mentioned
Answer: Option D
Explanation:
179. IP assigned for a client by DHCP server is
A. for a limited period
B. for unlimited period
C. not time dependent
D. none of the mentioned
Answer: Option A
Explanation:
180. DHCP uses UDP port ____ for sending data to the server.
A. 66
B. 67
C. 68
D. 69
Answer: Option B
Explanation:
181. The DHCP server can provide the _______ of the IP addresses.
A. dynamic allocation
B. automatic allocation
C. static allocation
D. all of the mentioned
Answer: Option D
Explanation:
182. DHCP client and servers on the same subnet communicate via
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer: Option A
Explanation:
183. After obtaining the IP address, to prevent the IP conflict the client may use
A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer: Option C
Explanation:
184. What is DHCP snooping?
A. techniques applied to ensure the security of an existing dhcp infrastructure
B. encryption of the dhcp server requests
C. algorithm for dhcp
D. none of the mentioned
Answer: Option A
Explanation:
185. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
A. mac address
B. ip address
C. both (a) and (b)
D. none of the mentioned
Answer: Option C
Explanation:
186. Real-time transport protocol (RTP) is mostly used in
A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer: Option D
Explanation:
187. RTP is used to
A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. none of the mentioned
Answer: Option A
Explanation:
188. RTP provides the facility of jitter ____ .
A. compensation
B. expansion
C. both (a) and (b)
D. none of the mentioned
Answer: Option A
Explanation:
189. Which protocol provides the synchronization between media streams?
A. rtp
B. rtcp
C. rpc
D. none of the mentioned
Answer: Option B
Explanation:
190. An RTP session is established for
A. each media stream
B. all media streams
C. some predefined number of media streams
D. none of the mentioned
Answer: Option A
Explanation:
191. RTP can use
A. unprivileged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer: Option D
Explanation:
192. Which one of the following multimedia formats cannot be supported by RTP?
A. mpeg-4
B. mjpeg
C. mpeg
D. none of the mentioned
Answer: Option D
Explanation:
193. An RTP header has a minimum size of
A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer: Option A
Explanation:
194. Which one of the following is not correct?
A. rtcp provides canonical end-point identifiers to all session participants
B. rtcp reports are expected to be sent by all participants
C. both (a) and (b)
D. none of the mentioned
Answer: Option D
Explanation:
195. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
A. srtp
B. rtcp
C. rcp
D. none of the mentioned
Answer: Option A
Explanation:
196. Ping can
A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
Answer: Option D
Explanation:
197. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is
A. use dual-stack approach
B. tunneling
C. no solution
D. replace the system
Answer: Option B
Explanation:
198. Ping sweep is a part of
A. traceroute
B. nmap
C. route
D. ipconfig
Answer: Option B
Explanation:
199. ICMP is used in
A. ping
B. traceroute
C. ifconfig
D. both a and b
Answer: Option D
Explanation:
200. _____ command is used to manipulate TCP/IP routing table.
A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer: Option A
Explanation:
- MCQ in Computer Network and Networking Part 20 | ECE Board Exam
- MCQ in Computer Network and Networking Part 19 | ECE Board Exam
- MCQ in Computer Network and Networking Part 18 | ECE Board Exam
- MCQ in Computer Network and Networking Part 17 | ECE Board Exam
- MCQ in Computer Network and Networking Part 16 | ECE Board Exam
- MCQ in Computer Network and Networking Part 15 | ECE Board Exam
- MCQ in Computer Network and Networking Part 14 | ECE Board Exam
- MCQ in Computer Network and Networking Part 13 | ECE Board Exam
- MCQ in Computer Network and Networking Part 12 | ECE Board Exam
- MCQ in Computer Network and Networking Part 11 | ECE Board Exam
- MCQ in Computer Network and Networking Part 10 | ECE Board Exam
- MCQ in Computer Network and Networking Part 9 | ECE Board Exam
- MCQ in Computer Network and Networking Part 8 | ECE Board Exam
- MCQ in Computer Network and Networking Part 7 | ECE Board Exam
- MCQ in Computer Network and Networking Part 6 | ECE Board Exam
- MCQ in Computer Network and Networking Part 5 | ECE Board Exam
- MCQ in Computer Network and Networking Part 4 | ECE Board Exam
- MCQ in Computer Network and Networking Part 3 | ECE Board Exam
- MCQ in Computer Network and Networking Part 2 | ECE Board Exam
- MCQ in Computer Network and Networking Part 1 | ECE Board Exam
MCQ in Computer Fundamentals Series
Complete List of MCQ in Communications Engineering per topic
Complete List of MCQ in Electronics Engineering per topic
P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.
“Will you subscribe today via YOUTUBE?”
TIRED OF ADS?
- Become Premium Member and experienced fewer ads to ads-free browsing.
- Full Content Access Exclusive to Premium members
- Access to PINOYBIX FREEBIES folder
- Download Reviewers and Learning Materials Free
- Download Content: You can see download/print button at the bottom of each post.
PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:
- CIVIL ENGINEERING REVIEWER
- CIVIL SERVICE EXAM REVIEWER
- CRIMINOLOGY REVIEWER
- ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
- ELECTRICAL ENGINEERING & RME REVIEWER
- FIRE OFFICER EXAMINATION REVIEWER
- LET REVIEWER
- MASTER PLUMBER REVIEWER
- MECHANICAL ENGINEERING REVIEWER
- NAPOLCOM REVIEWER
- Additional upload reviewers and learning materials are also FREE
FOR A LIMITED TIME
If you subscribe for PREMIUM today!
You will receive an additional 1 month of Premium Membership FREE.
For Bronze Membership an additional 2 months of Premium Membership FREE.
For Silver Membership an additional 3 months of Premium Membership FREE.
For Gold Membership an additional 5 months of Premium Membership FREE.
Join the PinoyBIX community.