Sunteți pe pagina 1din 9

AB Name :- Proximo Educational Society

Sector :- Telecome
Job Role :- Network Engineer

Sr.No Question Option A Option B Option C Option D Correct


Answer
1 How long is an IPv6 address? 32 bits 128 bytes 64 bits 128 bits D
2 What flavor of Network Address Translation can be used NAT Static Dynamic PAT D
to have one IP address allow many users to connect to
the global Internet?
3 What are the two main types of access control lists 1 and 3 2 and 4 3 and 4 1 and 2 A
(ACLs)?
1. Standard
2. IEEE
3. Extended
4. Specialized

4 What command is used to create a backup configuration? copy running copy running- config mem wr mem B
backup config startup-
config
5 You have 10 users plugged into a hub running 10Mbps 100 kbps 1 Mbps 2 Mbps 10 Mbps D
half-duplex. There is a server connected to the switch
running 10Mbps half-duplex as well. How much
bandwidth does each host have to the server?

6 Which WLAN IEEE specification allows up to 54Mbps at A B G N C


2.4GHz?
7 Which of the following is the valid host range for the subnet 192.168.168.1 192.168.168.129- 192.168.168.128-190 192.168.168. A
on which the IP address 192.168.168.188 255.255.255.192 29-190 191 128-192
resides?

8 To back up an IOS, what command will you use? backup IOS disk copy ios tftp copy tftp flash copy flash D
tftp
9 What protocol does PPP use to identify the Network layer NCP ISDN HDLC LCP A
protocol?
10 Which protocol does DHCP use at the Transport layer? IP TCP UDP ARP C

11 Where is a hub specified in the OSI model? Session layer Physical layer Data Link layer Application layer B
12 Which class of IP address has the most host addresses A B C A and B A
available by default?
13 In a network with dozens of switches, how many root 1 2 5 12 A
bridges would you have?
14 What is a stub network? A network with A network with A network with only A network D
more than one more than one one entry and no exit that has only
exit point. exit and entry point. one entry
point. and exit
point.

15 What is the main reason the OSI model was created? To create a So application So different networks So Cisco C
layered model developers can could communicate. could use the
larger than the change only one model.
DoD model. layer's protocols at
a time.

16 Which protocol does Ping use? TCP ARP ICMP BootP C


17 Communication between a computer and a keyboard Automatic Half-duplex Full-duplex Simplex D
involves ______________ transmission
18 Which organization has authority over interstate and ITU-T IEEE FCC ISOC C
international commerce in the communications field?

19 Which of this is not a network edge device? PC Smartphones Servers Switch D


20 Three or more devices share a link in ________ connection Unipoint Multipoint Point to point None of the B
mentioned

21 When collection of various computers seems a single computer distributed system networking system none of the B
coherent system to its client, then it is called network mentioned

22 Two devices are in network if a process in a process is PIDs of the processes none of the A
one device is running on both running of different mentioned
able to devices devices are same
exchange
information
with a process
in another
device

23 Which one of the following computer network is built on prior network chief network prime network overlay D
the top of another network? network
24 In computer network nodes are the computer the computer that the computer that all of the D
that originates routes the data terminates the data mentioned
the data

25 Communication channel is shared by all the machines on broadcast unicast network multicast network none of the A
the network in network mentioned
26 Bluetooth is an example of personal area local area network virtual private none of the A
network network mentioned
27 A __________ is a device that forwards packets between bridge firewall router all of the C
networks by processing the routing information included in mentioned
the packet.

28 A list of protocols used by a system, one protocol per layer, protocol protocol stack protocol suite none of the B
is called architecture mentioned
29 Network congestion occurs in case of traffic when a system when connection none of the A
overloading terminates between two nodes mentioned
terminates

30 Which one of the following extends a private network local area virtual private enterprise private storage area B
across public networks? network network network network

31 Which of this is not a constituent of residential telephone A high-speed A medium-speed A low-speed None of the C
line? downstream downstream downstream channel mentioned
channel channel

32 Home Access is provided by DSL FTTP Cable All of the D


mentioned
33 ONT is connected to splitter using High speed HFC Optical cable None of the C
fibre cable mentioned
34 These factors affect transmission rate in DSL The gauge of Degree of Shadow fading Both The D
the twisted- electrical gauge of the
pair line interfernece twisted-pair
line and
Degree of
electrical
interfernece

35 . The default connection type used by HTTP is _________ Persistent Non-persistent Can be either None of the A
persistent or non- mentioned
persistent depending
on connection request

36 The HTTP request message is sent in _________ part of First Second Third Fourth C
three-way handshake.
37 What is the access point (AP) in wireless LAN? device that wireless devices both device that none of the A
allows wireless itself allows wireless mentioned
devices to devices to connect to
connect to a a wired network and
wired network wireless devices itself

38 In wireless ad-hoc network access point is access point is nodes are not none of the A
not required must required mentioned

39 Which multiple access technique is used by IEEE 802.11 CDMA CSMA/CA ALOHA None of the B
standard for wireless LAN? mentioned

40 In wireless distribution system multiple access there is no access only one access point none of the A
point are inter- point exists mentioned
connected with
each other
41 A wireless network interface controller can work in infrastructure ad-hoc mode both infrastructure none of the C
mode mode and ad-hoc mentioned
mode

42 In wireless network an extended service set is a set of connected all stations all access points none of the A
basic service mentioned
sets

43 Mostly ________ is used in wireless LAN. time division orthogonal space division none of the B
multiplexing frequency division multiplexing mentioned
multiplexing

44 What is internet? a single a vast collection of interconnection of none of the B


network different networks local area networks mentioned

45 To join the internet, the computer has to be connected to a internet internet society internet service none of the C
architecture provider mentioned
board

46 Internet access by transmitting digital data over the wires of leased line digital subscriber digital signal line none of the B
a local telephone network is provided by line mentioned

47 ISP exchanges internet traffic between their networks by internet subscriber end isp end point none of the A
exchange point point mentioned

48 Which one of the following protocol is not used in internet? HTTP DHCP DNS None of the D
mentioned

49 IPv6 addressed have a size of 32 bits 64 bits 128 bits 265 bits C
50 Internet works on packet circuit switching both packet switching none of the A
switching and circuit switching mentioned

51 Which one of the following is not an application layer remote internet relay chat resource reservation none of the C
protocol used in internet? procedure call protocol mentioned

52 Which protocol assigns IP address to the client connected in DHCP IP RPC none of the A
the internet? mentioned
53 Which one of the following is not used in media access ethernet digital subscriber fiber distributed data none of the D
control? line interface mentioned
54 Modulator and demodulator as combinely is known as – Modulus Modem Mod switch Mod access B

55 Which of the following network device has the slowest type DSL Router Bridges Dial-up D
of connection? modems
56 Which of the following is an example of Personal Area Bluetooth WAN WLAN All of the A
Networking? above
57 A place where there is a field of signal through which you WiFi Hotspots WiFi Internet WiFi Zone WiFi Range A
can access WiFi internet is called –
58 Which network is able to connect and send data to each Star Router Bus LAN A
computer via central hub or switch without looking where
the data is sent?

59 Which network is able to connect to each computer through Bus Star router WAN A
a common central line?
60 Which topology allow to connect computers including Star Tree Ring LAN C
server in a ring?
61 How many different type of server exist? Only one Two Three Four D
62 Which type of network is used for small geographical area WLAN MAN LAN WAN C
such as in a one building?
63 Which networking device connect one LAN to other LAN Router Switch Bridge Modem B
using same protocol?
64 Each IP packet must contain Only Source Only Destination Source and Source or C
address address Destination address Destination
address

65 Bridge works in which layer of the OSI model? Appliation layer Transport layer Network layer Datalink layer D

66 _______ provides a connection-oriented reliable service for TCP IP UDP All of the A
sending messages above
67 Which layers of the OSI model are host-to-host layers? Transport, Network, Datalink, Network, Physical, A
Session, Transport, Session, Transport, Session Datalink,
Persentation, Presentation Network,
Application Transport

68 Which of the following IP address class is Multicast Class A Class B Class C Class D D

69 Which of the following is correct regarding Class B Address Network bit – Network bit – 16, Network bit – 18, Host Network bit – A
of IP address 14, Host bit – Host bit – 14 bit – 16 12, Host bit –
16 14
70 The last address of IP address represents Unicast address Network address Broadcast address None of C
above
71 How many bits are there in the Ethernet address? 64 bits 48 bits 32 bits 16 bits B

72 How many layers are in the TCP/IP model? 4 layers 5 layers 6 layers 7 layers A
73 Which of the following layer of OSI model also called end- Presentation Network layer Session layer Transport D
to-end layer? layer layer
74 Expansion of FTP is Fine Transfer File Transfer First Transfer Protocol None of the B
Protocol Protocol mentioned

75 FTP is built on _____ architecture Client-server P2P Both of the None of the A
mentioned mentioned

76 FTP uses _____ parallel TCP connections to transfer a file 1 2 3 4 B

77 Identify the incorrect statement FTP stands for FTP uses two FTP sends its control FTP sends C
File Transfer parallel TCP information in-band exactly one
Protocol connections file over the
data
connection

78 If 5 files are transfered from server A to client B in the same 5 10 2 6 D


session. The number of TCP connection
between A and B is

79 FTP server Mantains state Is stateless Has single TCP None of the A
connection for a file mentioned
transfer

80 The commands, from client to server, and replies, from 8 7 3 5 B


server to client, are sent across the control
connection in ____ bit ASCII format
81 Find the FTP reply whose message is wrongly matched 331 – 425 – Can’t open 452 – Error writing file 452 – Can’t D
Username OK, data connection open data
password connection
required

82 Mode of data transfer in FTP, where all the is left to TCP Stream mode Block mode Compressed mode None of the A
mentioned

83 The password is sent to the server using _____ command PASSWD PASS PASSWORD None of the B
mentioned

84 The attackers a network of compromised devices known as Internet Botnet Telnet D-net B

85 Which of the following is a form of DoS attack ? Vulnerability Bandwidth Connection flooding All of the D
attack flooding mentioned
86 The DoS attack is which the attacker establishes a large Vulnerability Bandwidth Connection flooding All of the C
number of half-open or fully open TCP connections attack flooding mentioned

87 DoS attack is which the attacker sends deluge of packets to Vulnerability Bandwidth Connection flooding All of the B
the targeted host attack flooding mentioned
88 Packet sniffers involve Active receiver Passive receiver Both of the None of the B
mentioned mentioned

89 Sniffers can be deployed in Wired WiFi Ethernet LAN All of the D


environment mentioned
90 Firewalls are often configured to block UDP traffic TCP traffic Both of the None of the A
mentioned mentioned

91 What is the minimum number of wires needed to send data 1 2 3 4 B


over it serial communication link layer?

92 The interactive transmission of data within a time sharing simplex line half duplex lines full duplex line bi-flex lines B
system may be best suited to…..
93 Which of the following is an example of a bounded coaxial cable wave guide fiber optic cable all of these D
medium?
94 LAN is useful for....... railway bank businessman transport C
95 Which of the following techniques needs source device and LAN Bluetooth WAN All D
destination device in line of sight for data transfer?

96 What is the frequency range of the IEEE 802.11a standard? 2.4Gbps 5Gbps 2.4GHz 5GHz D

97 What is the maximum distance running the lowest data rate About 100 feet About 175 feet About 300 feet About 350 D
for 802.11b? feet
98 What is the frequency range of the IEEE 802.11b standard? 2.4Gbps 5Gbps 2.4GHz 5GHz C

99 How often are BPDUs sent from a layer 2 device? Never Every 2 seconds Every 10 minutes Every 30 B
seconds
100 Which of the following is private IP address? 12.0.0.1 168.172.19.39 172.15.14.36 192.168.24.4 D
3

S-ar putea să vă placă și