MCQs > IT & Programming > Computer Networking MCQs > Basic Computer Networking MCQs

Basic Computer Networking MCQ

1. ____ is/are frequently added to buttons, logos, banners, and other web page graphics.

Answer

Correct Answer: Text

Note: This Question is unanswered, help us to find answer for this one

2. In ipv6, each extension header is identified by a specific ____ value.

Answer

Correct Answer: Next Header

Note: This Question is unanswered, help us to find answer for this one

3. The result from anding 11001111 with 10010001 is ____.

Answer

Correct Answer: 10000001.

Note: This Question is unanswered, help us to find answer for this one

4. The ip addresses 169.254.0.1 and 169.254.255.254 are both examples of ___________________.

Answer

Correct Answer: Private IP Addressing (APIPA)( record)

Note: This Question is unanswered, help us to find answer for this one

5. Arpanet, a new network of computers funded by arpa, was based on a plan developed by ____.

Answer

Correct Answer: When performing a natural language search, a search engine generally includes stop terms.

Note: This Question is unanswered, help us to find answer for this one

6. The older version of ip has a ________ header of control information.

Answer

Correct Answer: 192-bit

Note: This Question is unanswered, help us to find answer for this one

7. A virtual private network may include ________.

Answer

Correct Answer: Any of these

Note: This Question is unanswered, help us to find answer for this one

8. The _____ cable is a better-constructed version of the phone twisted-pair cable.

Answer

Correct Answer: Cat 5.

Note: This Question is unanswered, help us to find answer for this one

9. Ring networks use the ________ method to avoid data collisions.

Answer

Correct Answer: Token.

Note: This Question is unanswered, help us to find answer for this one

10. Quickbooks is an example of ________ software.

Answer

Correct Answer: Accounting.

Note: This Question is unanswered, help us to find answer for this one

11. On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.

Answer

Correct Answer: Repeaters

Note: This Question is unanswered, help us to find answer for this one

12. In a client-server network, _________ gets software from different vendors to work together.

Answer

Correct Answer: Middleware

Note: This Question is unanswered, help us to find answer for this one

13. Bluetooth, 3g, and wimax are examples of _____.

Answer

Correct Answer: Network standards.

Note: This Question is unanswered, help us to find answer for this one

14. Before data is transmitted on a network, it is first broken up into ____________________.

Answer

Correct Answer: Segments

Note: This Question is unanswered, help us to find answer for this one

15. An ip address in the form 197.169.100.1 is called a(n) ________.

Answer

Correct Answer: Dotted quad.

Note: This Question is unanswered, help us to find answer for this one

16. At the top of the internet structure are tier 1 ___________, such as at&t and sprint.

Answer

Correct Answer: Internet service providers

Note: This Question is unanswered, help us to find answer for this one

17. A(n) ________ device facilitates file sharing and data backup.

Answer

Correct Answer: NAS

Note: This Question is unanswered, help us to find answer for this one

18. A _________ is the place at which the isp provides services to its customers.

Answer

Correct Answer: Point-of-presence

Note: This Question is unanswered, help us to find answer for this one

19. ________ software helps you manage e-mail, contacts, calendars, and tasks in the same application.

Answer

Correct Answer: Personal information manager

Note: This Question is unanswered, help us to find answer for this one

20. Email is the transmission of messages and files between computers or smart devices over a(n) ____.

Answer

Correct Answer: Network.

Note: This Question is unanswered, help us to find answer for this one

21. High-speed ________ communication lines on the internet backbone use fiber optics.

Answer

Correct Answer: OC

Note: This Question is unanswered, help us to find answer for this one

22. The most common type of internet search is the ____.

Answer

Correct Answer: Keyword search

Note: This Question is unanswered, help us to find answer for this one

23. The connection to a peripheral is often called the ____.

Answer

Correct Answer: Interface

Note: This Question is unanswered, help us to find answer for this one

24. Local area networks (lans) are used to _____.

Answer

Correct Answer: Integrate services, such as email and file sharing

Note: This Question is unanswered, help us to find answer for this one

25. Internet networks are _____.

Answer

Correct Answer: Packet-switched networks

Note: This Question is unanswered, help us to find answer for this one

26. Installing proper shielding on cables prevents ____.

Answer

Correct Answer: Crosstalk

Note: This Question is unanswered, help us to find answer for this one

27. With ____, you can send electrical power over the ethernet connection.

Answer

Correct Answer: Power over Ethernet (PoE)

Note: This Question is unanswered, help us to find answer for this one

28. With ____, data is sent one bit at a time, one after the other along a single path.

Answer

Correct Answer: Serial transmission

Note: This Question is unanswered, help us to find answer for this one

29. Your computer needs a(n) _____ to access a network.

Answer

Correct Answer: NIC

Note: This Question is unanswered, help us to find answer for this one

30. You need your own domain name if ____.

Answer

Correct Answer: You have your own website

Note: This Question is unanswered, help us to find answer for this one

31. To access a newsgroup, a(n) ________ program is needed.

Answer

Correct Answer: Newsreader

Note: This Question is unanswered, help us to find answer for this one

32. The _________ language, which was used in the first web page ever created, is still in use today.

Answer

Correct Answer: HTML

Note: This Question is unanswered, help us to find answer for this one

33. In a web-based design, the internet serves as the _____ for the database management system.

Answer

Correct Answer: Interface
Front end

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

34. A(n) ________ network is often the type of network that is set up in a home or very small business.

Answer

Correct Answer: Peer-to-peer

Note: This Question is unanswered, help us to find answer for this one

35. A _____ defines what must take place, not how it will be accomplished.

Answer

Correct Answer: Logical design

Note: This Question is unanswered, help us to find answer for this one

36. The most common way to access the internet is through _______.

Answer

Correct Answer: ISP (Internet Service Provider)

Note: This Question is unanswered, help us to find answer for this one

37. The fact that signal strength falls off with distance is called ________________.

Answer

Correct Answer: Attenuation.

Note: This Question is unanswered, help us to find answer for this one

38. The ____ is the parent organization for all the various internet boards and task forces.

Answer

Correct Answer: Internet Society

Note: This Question is unanswered, help us to find answer for this one

39. In _____, each department has its own computer for performing and controlling processing tasks.

Answer

Correct Answer: Decentralized processing

Note: This Question is unanswered, help us to find answer for this one

40. Http is an example of a(n) ______ layer protocol.

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

41. Developing effective apps is considered a critical element to the successful adoption of ________.

Answer

Correct Answer: Wearable computing

Note: This Question is unanswered, help us to find answer for this one

42. All of the following are tasks for network administration of a large organization except ________.

Answer

Correct Answer: Purchasing initial equipment for the network

Note: This Question is unanswered, help us to find answer for this one

43. _______is a nonprofit organization that is responsible for creating top-level domain names.

Answer

Correct Answer: ICANN

Note: This Question is unanswered, help us to find answer for this one

44. A _____ links computer resources using either a wired or wireless connection.

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

45. Examples of ____ include what, where, is, the, of, in, and how.

Answer

Correct Answer: Stop words

Note: This Question is unanswered, help us to find answer for this one

46. ____ is an example of a web crawler.

Answer

Correct Answer: Googlebot

Note: This Question is unanswered, help us to find answer for this one

47. ____ is a popular cable type used as a network backbone by major telecommunications companies.

Answer

Correct Answer: Fiber optic

Note: This Question is unanswered, help us to find answer for this one

48. ____ defines how information travels across the internet.

Answer

Correct Answer: Both a and b

Note: This Question is unanswered, help us to find answer for this one

49. Dsl uses ____ to transmit data.

Answer

Correct Answer: Phone lines

Note: This Question is unanswered, help us to find answer for this one

50. Dependability is a characteristic of ____

Answer

Correct Answer: Soft skills

Note: This Question is unanswered, help us to find answer for this one

51. Application layer data lives in the _____ section of the transport layer protocol

Answer

Correct Answer: Data payload

Note: This Question is unanswered, help us to find answer for this one

52. A(n) _____ identifies a web page and is the address of a document or site on the internet.

Answer

Correct Answer: Uniform resource locator (URL)

Note: This Question is unanswered, help us to find answer for this one

53. A(n) ____ is a computer used to host programs and data for a network.

Answer

Correct Answer: Midrange server

Note: This Question is unanswered, help us to find answer for this one

54. A wired network is one that uses ____ to connect network devices.

Answer

Correct Answer: Cables

Note: This Question is unanswered, help us to find answer for this one

55. A mainframe computer that controls a large network is called the ________ computer.

Answer

Correct Answer: Host

Note: This Question is unanswered, help us to find answer for this one

56. A ____________________ is the name of a computer and can be used in place of its ip address.

Answer

Correct Answer: Host name

Note: This Question is unanswered, help us to find answer for this one

57. A ______ has a similar role to a hub.

Answer

Correct Answer: Switch

Note: This Question is unanswered, help us to find answer for this one

58. A ____ is a web-based resource that helps you find specific information on the web.

Answer

Correct Answer: Search tool

Note: This Question is unanswered, help us to find answer for this one

59. You can create web pages using a(n) ____, such as adobe dreamweaver or amaya.

Answer

Correct Answer: WYSIWYG editor

Note: This Question is unanswered, help us to find answer for this one

60. Many network problems can be traced to poor cable ____ techniques.

Answer

Correct Answer: Installation

Note: This Question is unanswered, help us to find answer for this one

61. A ____ occurs when two transmissions interfere with each other

Answer

Correct Answer: Collision

Note: This Question is unanswered, help us to find answer for this one

62. An mis infrastructure is ________and ________.

Answer

Correct Answer: Dynamic; continually changing

Note: This Question is unanswered, help us to find answer for this one

63. A wireless ____ connects a wireless network to a wired network.

Answer

Correct Answer: Access point

Note: This Question is unanswered, help us to find answer for this one

64. Each _____ contains data about people, places, things, or events.

Answer

Correct Answer: Table

Note: This Question is unanswered, help us to find answer for this one

65. When voip relies on the internet, it is often called ____.

Answer

Correct Answer: Telephony

Note: This Question is unanswered, help us to find answer for this one

66. Using a vpc, an organization can store its ________.

Answer

Correct Answer: Most sensitive data.

Note: This Question is unanswered, help us to find answer for this one

67. The standard method of specifying the format of web pages is called ________.

Answer

Correct Answer: Hypertext Markup Language (HTML)

Note: This Question is unanswered, help us to find answer for this one

68. A(n) ________ is a computer that connects to or requests services from a server.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

69. The most popular wireless lan technology is ____

Answer

Correct Answer: Wi-Fi

Note: This Question is unanswered, help us to find answer for this one

70. A(n) ________ is an information system (is) that provides computer-based activity at a distance.

Answer

Correct Answer: Remote action system

Note: This Question is unanswered, help us to find answer for this one

71. You use ________ to predict when a computer hardware system becomes saturated.

Answer

Correct Answer: Capacity planning

Note: This Question is unanswered, help us to find answer for this one

72. The concept of two keys, public and private, is called ____ cryptography.

Answer

Correct Answer: Public key

Note: This Question is unanswered, help us to find answer for this one

73. ____ is commonly used to enable web browsers to communicate with web servers.

Answer

Correct Answer: HTTP

Note: This Question is unanswered, help us to find answer for this one

74. A ____ connects devices on a network so all the devices can access network components.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

75. Organizations can dynamically reuse servers that use web services internally by ________.

Answer

Correct Answer: Creating a private cloud

Note: This Question is unanswered, help us to find answer for this one

76. _____ involves updating one or more databases with new transactions.

Answer

Correct Answer: Data storage

Note: This Question is unanswered, help us to find answer for this one

77. Hardware diagnosis and failure alert are handled by ____

Answer

Correct Answer: Network management services

Note: This Question is unanswered, help us to find answer for this one

78. Amazon redshift offers ________.

Answer

Correct Answer: Petabyte-scale data warehouse

Note: This Question is unanswered, help us to find answer for this one

79. A ________ network can contain servers as well as individual computers.

Answer

Correct Answer: Client/server

Note: This Question is unanswered, help us to find answer for this one

80. The network architecture that spans the largest physical distance is called a ________.

Answer

Correct Answer: WAN

Note: This Question is unanswered, help us to find answer for this one

81. The internet protocol suite consists of the internet protocol and _____.

Answer

Correct Answer: Transmission Control Protocol

Note: This Question is unanswered, help us to find answer for this one

82. One task of the ____ layer in a lan is to handle error detection using a crc.

Answer

Correct Answer: Data Link

Note: This Question is unanswered, help us to find answer for this one

83. Ipv4 uses ________ bytes per internet address.

Answer

Correct Answer: 4

Note: This Question is unanswered, help us to find answer for this one

84. A typical tcp segment has a _______ header of control information.

Answer

Correct Answer: 192

Note: This Question is unanswered, help us to find answer for this one

85. The ____________ protocol places packets on, and receives them from, the network medium.

Answer

Correct Answer: Network interface

Note: This Question is unanswered, help us to find answer for this one

86. A 32-bit-word computer can access _______.

Answer

Correct Answer: 4 bytes at a time

Note: This Question is unanswered, help us to find answer for this one

87. The ________ is a core internet protocol that guarantees the reliable delivery of packets.

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

88. The application layer separates data into ____, or discrete amounts of data.

Answer

Correct Answer: PDU (protocol data units)

Note: This Question is unanswered, help us to find answer for this one

89. Network technologies that use _______________ light use single-mode fiber optic cabling.

Answer

Correct Answer: Lazer light

Note: This Question is unanswered, help us to find answer for this one

90. In the osi (open system interconnection) model, the session layer ____.

Answer

Correct Answer: Five

Note: This Question is unanswered, help us to find answer for this one

91. In the osi (open system interconnection) model, the presentation layer ____.

Answer

Correct Answer: Six

Note: This Question is unanswered, help us to find answer for this one

92. In the osi (open system interconnection) model, the application layer ____.

Answer

Correct Answer: Seven

Note: This Question is unanswered, help us to find answer for this one

93. A ____ can be used to intercept a telephone conversation.

Answer

Correct Answer: Butt set

Note: This Question is unanswered, help us to find answer for this one

94. 802.11 is a series of standards to identify ______ networks.

Answer

Correct Answer: Wi-Fi

Note: This Question is unanswered, help us to find answer for this one

95. 1000base-sx has a maximum throughput of ____.

Answer

Correct Answer: 1 Gbps

Note: This Question is unanswered, help us to find answer for this one

96. The primary design of a(n) _____ is to capture the transmissions from legitimate users.

Answer

Correct Answer: Rogue access point

Note: This Question is unanswered, help us to find answer for this one

97. A hierarchical topology is also called a ____ topology.

Answer

Correct Answer: Tree

Note: This Question is unanswered, help us to find answer for this one

98. ________ is used to allow remote login on another computer.

Answer

Correct Answer: Telnet

Note: This Question is unanswered, help us to find answer for this one

99. A ____ can interpret physical addressing information

Answer

Correct Answer: Bridge

Note: This Question is unanswered, help us to find answer for this one

100. ______________ provides a nonexclusive it infrastructure over the internet.

Answer

Correct Answer: Public Cloud Computing

Note: This Question is unanswered, help us to find answer for this one

101. __________ encompasses intrusion detection, prevention and response.

Answer

Correct Answer: Intrusion management

Note: This Question is unanswered, help us to find answer for this one

102. ____ is the process of reconstructing segmented data

Answer

Correct Answer: Reassembly

Note: This Question is unanswered, help us to find answer for this one

103. The current version of wireless ethernet is ________.

Answer

Correct Answer: 802.11n

Note: This Question is unanswered, help us to find answer for this one

104. The ____ layer is the interface between network software and hardware.

Answer

Correct Answer: Data Link

Note: This Question is unanswered, help us to find answer for this one

105. A(n) ____ network uses a central cable to which all network devices connect.

Answer

Correct Answer: Bus

Note: This Question is unanswered, help us to find answer for this one

106. The exclusive use of 0s and 1s as a way to communicate with the computer is known as ____ language.

Answer

Correct Answer: Machine

Note: This Question is unanswered, help us to find answer for this one

107. A wireless ________ extender is a wireless network device that repeats your wireless signal.

Answer

Correct Answer: Range

Note: This Question is unanswered, help us to find answer for this one

108. A wi-fi ______ is a wireless local area network that provides internet access to the public.

Answer

Correct Answer: Hot spot

Note: This Question is unanswered, help us to find answer for this one

109. ____ is an example of a circuit-switched network.

Answer

Correct Answer: Telephone network

Note: This Question is unanswered, help us to find answer for this one

110. The main reason for offshore outsourcing is to _____.

Answer

Correct Answer: ​lower bottom-line costs

Note: This Question is unanswered, help us to find answer for this one

111. _____ is a satellite-based tracking system that enables users to determine a person’s position.

Answer

Correct Answer: Global positioning system

Note: This Question is unanswered, help us to find answer for this one

112. ____ describes a popular serial data transmission method.

Answer

Correct Answer: RS-232

Note: This Question is unanswered, help us to find answer for this one

113. _____ radio frequency identification (rfid) tags have no internal power supply.

Answer

Correct Answer: Passive

Note: This Question is unanswered, help us to find answer for this one

114. ________ is a very well known free voip provider

Answer

Correct Answer: Skype

Note: This Question is unanswered, help us to find answer for this one

115. An organization that hires cloud services ________.

Answer

Correct Answer: Can limit the response time of its Web pages

Note: This Question is unanswered, help us to find answer for this one

116. A ________ detects the speed that a given device can handle and communicates with it at that speed.

Answer

Correct Answer: Modem

Note: This Question is unanswered, help us to find answer for this one

117. A _____ sends messages through several connected lans or to a wide-area network.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

118. A ____ measures the time a package takes to process a certain number of transactions

Answer

Correct Answer: Benchmark

Note: This Question is unanswered, help us to find answer for this one

119. A firm that offers outsourcing solutions is called a _____.

Answer

Correct Answer: Service provider

Note: This Question is unanswered, help us to find answer for this one

120. A firm that offers outsourcing solutions is called a ____ provider

Answer

Correct Answer: Service

Note: This Question is unanswered, help us to find answer for this one

121. A communications ____ determines how devices on a network communicate

Answer

Correct Answer: Protocol

Note: This Question is unanswered, help us to find answer for this one

122. __________ are high speed central networks to which multiple smaller networks connect

Answer

Correct Answer: Corporate backbone networks

Note: This Question is unanswered, help us to find answer for this one

123. A(n) __________ circuit is another name for a multipoint configuration.

Answer

Correct Answer: Shared

Note: This Question is unanswered, help us to find answer for this one

124. A(n) _____ is a device that connects a user to the internet.

Answer

Correct Answer: Modem

Note: This Question is unanswered, help us to find answer for this one

125. The process of deciding which path the data takes on a network is called _____.

Answer

Correct Answer: Routing

Note: This Question is unanswered, help us to find answer for this one

126. Step d in the accompanying figure is known as the ____ step.

Answer

Correct Answer: Storage

Note: This Question is unanswered, help us to find answer for this one

127. The ____________ protocol enables client application programs to access the other layers.

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

128. The ____________ command shows current sessions with associated port numbers.

Answer

Correct Answer: Netstat -n

Note: This Question is unanswered, help us to find answer for this one

129. The ____ is a large, distributed database of internet addresses and domain names.

Answer

Correct Answer: Domain Name System (DNS)

Note: This Question is unanswered, help us to find answer for this one

130. Switches can create ____ by grouping a number of ports into a broadcast domain.

Answer

Correct Answer: VLANs

Note: This Question is unanswered, help us to find answer for this one

131. The cloud is defined with all the following terms, except ________.

Answer

Correct Answer: Dedicated

Note: This Question is unanswered, help us to find answer for this one

132. The three basic types of subnetworks are ____, packet-switched, and broadcast.

Answer

Correct Answer: Circuit-switched

Note: This Question is unanswered, help us to find answer for this one

133. The telephone system is an example of a ________ network.

Answer

Correct Answer: Circuit-switched

Note: This Question is unanswered, help us to find answer for this one

134. The sonet network topology is a ____.

Answer

Correct Answer: Ring

Note: This Question is unanswered, help us to find answer for this one

135. Wireless network devices use ________ to communicate with each other

Answer

Correct Answer: Radio waves

Note: This Question is unanswered, help us to find answer for this one

136. Wireless internet is available using ________

Answer

Correct Answer: Radio waves

Note: This Question is unanswered, help us to find answer for this one

137. When setting up a home network, make sure each node has ________.

Answer

Correct Answer: Network adapter

Note: This Question is unanswered, help us to find answer for this one

138. Two of the most common types of communications hardware are ____ and network adapters.

Answer

Correct Answer: Modems

Note: This Question is unanswered, help us to find answer for this one

139. To prevent eavesdropping, applications should ________.

Answer

Correct Answer: Use encryption for confidentiality.

Note: This Question is unanswered, help us to find answer for this one

140. To connect to a lan, a computer requires ____.

Answer

Correct Answer: A network interface card

Note: This Question is unanswered, help us to find answer for this one

141. The world-wide-web uses _____ protocol for transmitting content.

Answer

Correct Answer: Hyper-text transfer

Note: This Question is unanswered, help us to find answer for this one

142. The web, messaging, and ____ communications are three of the more widely used internet services.

Answer

Correct Answer: Video

Note: This Question is unanswered, help us to find answer for this one

143. The web server software accepts ____ requests from web browsers connected to the internet.

Answer

Correct Answer: HTTP

Note: This Question is unanswered, help us to find answer for this one

144. The way people view and understand an object or subject depends primarily on ___________.

Answer

Correct Answer: Perception

Note: This Question is unanswered, help us to find answer for this one

145. The individual geographic locations connected by a wan are known as ____.

Answer

Correct Answer: WAN sites

Note: This Question is unanswered, help us to find answer for this one

146. The function of _____ is to convert digital signals to analog signals and vice-versa.

Answer

Correct Answer: Modems

Note: This Question is unanswered, help us to find answer for this one

147. The fastest version of wireless ethernet is ________.

Answer

Correct Answer: 802.11ac

Note: This Question is unanswered, help us to find answer for this one

148. Web-based application software is software that ________.

Answer

Correct Answer: Is stored completely on a web server instead of your hard drive

Note: This Question is unanswered, help us to find answer for this one

149. Using a ______________, packets are delivered to a single node on a network

Answer

Correct Answer: Unicast address

Note: This Question is unanswered, help us to find answer for this one

150. To connect devices within your workspace, use a ______.

Answer

Correct Answer: PAN.

Note: This Question is unanswered, help us to find answer for this one

151. The technique used for data sent over the internet is ____.

Answer

Correct Answer: Packet Switching

Note: This Question is unanswered, help us to find answer for this one

152. With ____ transmission, data is sent one bit at a time.

Answer

Correct Answer: Serial transmission

Note: This Question is unanswered, help us to find answer for this one

153. To transfer data packets between two or more networks, a ________ is used.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

154. The purpose of the ________ protocol is to ensure the integrity of the communication.

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

155. The process of naming program variables and assigning a type to them is called ____ variables.

Answer

Correct Answer: Declaring

Note: This Question is unanswered, help us to find answer for this one

156. The problem of using ip numbers for addressing hosts in the internet are resolved using __________.

Answer

Correct Answer: The concept of domains and the use of domain names

Note: This Question is unanswered, help us to find answer for this one

157. The protocols pop3 and __________ can be used to manage your incoming mail.

Answer

Correct Answer: B. IMAP

Note: This Question is unanswered, help us to find answer for this one

158. Secure wi-fi networks and vpns use _____ to secure data transferred over a network.

Answer

Correct Answer: Encryption

Note: This Question is unanswered, help us to find answer for this one

159. On most modern wans, a ring topology relies on ____ rings to carry data.

Answer

Correct Answer: Redundant

Note: This Question is unanswered, help us to find answer for this one

160. On a client/server system, most of the powerful processing is handled by the ________.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

161. Normal telephone cable is a type of ________.

Answer

Correct Answer: Twisted-pair cable

Note: This Question is unanswered, help us to find answer for this one

162. Network architectures are classified according to ________

Answer

Correct Answer: The way they are controlled and the distance between their nodes

Note: This Question is unanswered, help us to find answer for this one

163. Multiple companies may take advantage of the ____ cloud to pool their cloud resources.

Answer

Correct Answer: Community

Note: This Question is unanswered, help us to find answer for this one

164. Most wireless networks transport data as ____ signals.

Answer

Correct Answer: RF (radio frequency)

Note: This Question is unanswered, help us to find answer for this one

165. Microsoft’s ____ is one of the major web-based development environments.

Answer

Correct Answer: .NET

Note: This Question is unanswered, help us to find answer for this one

166. Many it ____ offer specialized services that help companies select software packages.

Answer

Correct Answer: Consultants

Note: This Question is unanswered, help us to find answer for this one

167. Many certificates conform to the ____ standard.

Answer

Correct Answer: X.509

Note: This Question is unanswered, help us to find answer for this one

168. Ipv6 was needed when ipv4 ________

Answer

Correct Answer: No longer had enough unique addresses

Note: This Question is unanswered, help us to find answer for this one

169. In the sliding windows mechanism for flow control, the ____ before waiting for an acknowledgment

Answer

Correct Answer: Sender sends as much data as specified by the receiver in the window size field

Note: This Question is unanswered, help us to find answer for this one

170. In the context of networking, on-demand computing is also known as ____.

Answer

Correct Answer: Utility

Note: This Question is unanswered, help us to find answer for this one

171. In csma/ca, the amount of time a device is made to wait before it can transmit is called the ____.

Answer

Correct Answer: Interframe space (IFS)

Note: This Question is unanswered, help us to find answer for this one

172. In a(n) ____ relationship, multiple users are provided with access to a server at the same time.

Answer

Correct Answer: Client/server

Note: This Question is unanswered, help us to find answer for this one

173. In a(n) ____ cluster, every server in the cluster performs useful work.

Answer

Correct Answer: Symmetric server

Note: This Question is unanswered, help us to find answer for this one

174. In a ___________ architecture, computers are both client and server, thus sharing the work.

Answer

Correct Answer: Peer-to-peer

Note: This Question is unanswered, help us to find answer for this one

175. In ____, each datagram can follow one of many paths to reach its destination.

Answer

Correct Answer: Packet switching

Note: This Question is unanswered, help us to find answer for this one

176. In _____ processing, each department has its own computer for performing processing tasks.

Answer

Correct Answer: Decentralized

Note: This Question is unanswered, help us to find answer for this one

177. In _____ data transmission, multiple pieces of data are sent simultaneously.

Answer

Correct Answer: Broadband

Note: This Question is unanswered, help us to find answer for this one

178. If an organization opts for software as a service (saas), it will have to ________.

Answer

Correct Answer: Transfer data and develop procedures

Note: This Question is unanswered, help us to find answer for this one

179. High speed ________ communication lines use fiber optics

Answer

Correct Answer: OC

Note: This Question is unanswered, help us to find answer for this one

180. Every computer on the internet has a unique numeric address called a(n) _______.

Answer

Correct Answer: IP address

Note: This Question is unanswered, help us to find answer for this one

181. Electrical data suitable for transmission is called a(n) _______.

Answer

Correct Answer: Signal

Note: This Question is unanswered, help us to find answer for this one

182. Each vm is known as a ____

Answer

Correct Answer: Guest

Note: This Question is unanswered, help us to find answer for this one

183. Each computer or device on a network is called a(n) ______.

Answer

Correct Answer: Node

Note: This Question is unanswered, help us to find answer for this one

184. Data is physically transmitted from one computer or terminal to another in the ________ layer.

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

185. Data is broken into _____ to be transmitted over the internet.

Answer

Correct Answer: Packets

Note: This Question is unanswered, help us to find answer for this one

186. Data are sent through a network in bundles called ________.

Answer

Correct Answer: Packets

Note: This Question is unanswered, help us to find answer for this one

187. Connecting two wide area networks requires devices such as high-speed ____.

Answer

Correct Answer: Reflectors

Note: This Question is unanswered, help us to find answer for this one

188. Computer criminals use denial-of-service attacks on information systems to __________.

Answer

Correct Answer: Prevent legitimate users from using the system's resources

Note: This Question is unanswered, help us to find answer for this one

189. Combining voice, video, and data communications into one interface is known as ____ communications.

Answer

Correct Answer: Unified

Note: This Question is unanswered, help us to find answer for this one

190. Cloud resources are described as pooled because ________.

Answer

Correct Answer: The same physical hardware is shared by many different organizations

Note: This Question is unanswered, help us to find answer for this one

191. Cloud resources are ________ because many different organizations use the same physical hardware.

Answer

Correct Answer: Pooled

Note: This Question is unanswered, help us to find answer for this one

192. Cellular services use _____ to provide wireless connectivity to the internet.

Answer

Correct Answer: 3G and 4G cellular networks

Note: This Question is unanswered, help us to find answer for this one

193. Benefits of using the cloud include all of the following except ________.

Answer

Correct Answer: Use of dumb terminals

Note: This Question is unanswered, help us to find answer for this one

194. An organization that uses cloud services ________.

Answer

Correct Answer: Public

Note: This Question is unanswered, help us to find answer for this one

195. An it infrastructure includes ________.

Answer

Correct Answer: Hardware, software, and services

Note: This Question is unanswered, help us to find answer for this one

196. A voip system supports voice and ____ services.

Answer

Correct Answer: Videophone

Note: This Question is unanswered, help us to find answer for this one

197. A network ____ usually contains a computer, networked peripheral, or network device.

Answer

Correct Answer: Node

Note: This Question is unanswered, help us to find answer for this one

198. A distributed computing system usually includes ____.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

199. A computer bus consists of data lines, __________, control lines, and power lines.

Answer

Correct Answer: Address lines

Note: This Question is unanswered, help us to find answer for this one

200. A communication ______ is a virtual end point for data entering and leaving a digital device.

Answer

Correct Answer: Port

Note: This Question is unanswered, help us to find answer for this one

201. A ___________ topology is fully redundant and is the most expensive to implement.

Answer

Correct Answer: Mesh

Note: This Question is unanswered, help us to find answer for this one

202. A ________ topology uses more than one topology when building a network.

Answer

Correct Answer: Hybrid

Note: This Question is unanswered, help us to find answer for this one

203. A ________ sends data from one collision domain to another.

Answer

Correct Answer: Bridge

Note: This Question is unanswered, help us to find answer for this one

204. A ________ is a collection of computers connected to one another or to a common connection medium.

Answer

Correct Answer: LAN

Note: This Question is unanswered, help us to find answer for this one

205. A ____ network is the only network that offers a dedicated path.

Answer

Correct Answer: Circuit-switched

Note: This Question is unanswered, help us to find answer for this one

206. A ____ network uses radio frequencies to transmit data between computers and devices on a network.

Answer

Correct Answer: Wireless

Note: This Question is unanswered, help us to find answer for this one

207. A ____ is not a type of network device.

Answer

Correct Answer: Workstation

Note: This Question is unanswered, help us to find answer for this one

208. A ____ is a repeater with more than one output port.

Answer

Correct Answer: Hub

Note: This Question is unanswered, help us to find answer for this one

209. A ____ is a computer on a network used to store files.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

210. ___________ ensures that the network is operating as efficiently as possible.

Answer

Correct Answer: Performance management

Note: This Question is unanswered, help us to find answer for this one

211. ________ use multiple wi-fi access points to create a wide area network.

Answer

Correct Answer: Mesh networks

Note: This Question is unanswered, help us to find answer for this one

212. ________ is a set of function and call programs that allow clients and servers to intercommunicate.

Answer

Correct Answer: Middleware

Note: This Question is unanswered, help us to find answer for this one

213. ________ can be used to create what appears to be a private secure network over the internet.

Answer

Correct Answer: Virtual Private Networks

Note: This Question is unanswered, help us to find answer for this one

214. ______ is a set of applications that manages the activities and resources of a computer.

Answer

Correct Answer: System software

Note: This Question is unanswered, help us to find answer for this one

215. _____ is a markup language designed to transport and store data on the web.

Answer

Correct Answer: Extensible Markup Language (XML)

Note: This Question is unanswered, help us to find answer for this one

216. _____ computing is also known as on-demand computing.

Answer

Correct Answer: Utility

Note: This Question is unanswered, help us to find answer for this one

217. _____ combine data from different item attributes, or characteristics, to build a code.

Answer

Correct Answer: Derivation code

Note: This Question is unanswered, help us to find answer for this one

218. _____ are used to share data between networks around the world.

Answer

Correct Answer: WANs

Note: This Question is unanswered, help us to find answer for this one

219. ____ refers to the act of breaking into a computer or network.

Answer

Correct Answer: Pharming

Note: This Question is unanswered, help us to find answer for this one

220. ____ provide a web-based client for checking e-mail.

Answer

Correct Answer: Mail servers

Note: This Question is unanswered, help us to find answer for this one

221. ____ is the most widely implemented virtualization software today

Answer

Correct Answer: VMware

Note: This Question is unanswered, help us to find answer for this one

222. ____ is an updated, digital version of x.25 that also relies on packet switching.

Answer

Correct Answer: Frame relay

Note: This Question is unanswered, help us to find answer for this one

223. ____ is a disadvantage of using a wireless network when compared to a wired network.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

224. ____ ip addresses are ip addresses that are not assigned to any specific user or organization.

Answer

Correct Answer: Private

Note: This Question is unanswered, help us to find answer for this one

225. ____ involves security audit personnel trying to hack into a network.

Answer

Correct Answer: Penetration testing

Note: This Question is unanswered, help us to find answer for this one

226. ____ are wide area networks that are logically defined over public transmission systems.

Answer

Correct Answer: VPNs

Note: This Question is unanswered, help us to find answer for this one

227. ____ are often considered first-level support.

Answer

Correct Answer: Help desk analysts

Note: This Question is unanswered, help us to find answer for this one

228. ____ are encrypted messages that can be mathematically proven to be authentic.

Answer

Correct Answer: Digital signatures

Note: This Question is unanswered, help us to find answer for this one

229. ____ and distributed routing are methods for controlling routing information.

Answer

Correct Answer: Centralized

Note: This Question is unanswered, help us to find answer for this one

230. Which is an example of wireless encryption?

Answer

Correct Answer: WPA

Note: This Question is unanswered, help us to find answer for this one

231. Which technology exists that allows a non-routable IP address to communicate with the global IP Internet Network?

Answer

Correct Answer: NAT (Network Address Translation)

Note: This Question is unanswered, help us to find answer for this one

232. Which of the following is the maximum supported distance for an Ethernet cable run?

Answer

Correct Answer: 100 m / 328 ft

Note: This Question is unanswered, help us to find answer for this one

233. Which one is a connectionless protocol?

Answer

Correct Answer: UDP

Note: This Question is unanswered, help us to find answer for this one

234. Which describes the purpose of an IP?

Answer

Correct Answer: To uniquely identify a host computer on a network

Note: This Question is unanswered, help us to find answer for this one

235. Which best describes a client/server model?

Answer

Correct Answer: A client host requests a service from an always-on server

Note: This Question is unanswered, help us to find answer for this one

236. Which type of device is a hub?

Answer

Correct Answer: Broadcast

Note: This Question is unanswered, help us to find answer for this one

237. In TCP/IP model, on which layer does TCP and UDP protocols work?

Answer

Correct Answer: Transport layer

Note: This Question is unanswered, help us to find answer for this one

238. Which of the following is the correct term for a WA router that responds to an ARP request intended for a remote host?

Answer

Correct Answer: Proxy ARP

Note: This Question is unanswered, help us to find answer for this one

239. Which term is used to describe variability of packet delays within the same packet stream?

Answer

Correct Answer: Jitter

Note: This Question is unanswered, help us to find answer for this one

240. Which entity is responsible for top-level country domains such as uk, ca, and jp?

Answer

Correct Answer: Top-level domain (TLD) servers

Note: This Question is unanswered, help us to find answer for this one

241. Which is the name of the unit exchanged at the Data Link Layer?

Answer

Correct Answer: Frames

Note: This Question is unanswered, help us to find answer for this one

242. Which of the following is the primary Layer 3 protocol in the TCP/IP suite?

Answer

Correct Answer: IP

Note: This Question is unanswered, help us to find answer for this one

243. Which of the following is currently the most common and fastest transmission rate for ethernet cables?

Answer

Correct Answer: Gigabit

Note: This Question is unanswered, help us to find answer for this one

244. Which does ADSL stand for?

Answer

Correct Answer: Asymmetric digital subscriber line

Note: This Question is unanswered, help us to find answer for this one

245. Which defines a firewall in a Computer Network?

Answer

Correct Answer: System to prevent unauthorized access

Note: This Question is unanswered, help us to find answer for this one

246. Which is the port number of HTTP?

Answer

Correct Answer: 80

Note: This Question is unanswered, help us to find answer for this one

247. Which of the following defines bandwidth?

Answer

Correct Answer: Transmission rate

Note: This Question is unanswered, help us to find answer for this one

248. Which type of network is commonly used in houses?

Answer

Correct Answer: LAN

Note: This Question is unanswered, help us to find answer for this one

249. Which of the following is NIC?

Answer

Correct Answer: Network Interface Card

Note: This Question is unanswered, help us to find answer for this one

250. Which of the following describes a TCP protocol?

Answer

Correct Answer: Connection Oriented

Note: This Question is unanswered, help us to find answer for this one

251. Which port number does SSH run on?

Answer

Correct Answer: 22

Note: This Question is unanswered, help us to find answer for this one

252. In the Command Prompt, which is the command to show the most detailed printout of IP address info?

Answer

Correct Answer: ipconfig /all

Note: This Question is unanswered, help us to find answer for this one

253. Which network type covers the country level location?

Answer

Correct Answer: Wide Area Network

Note: This Question is unanswered, help us to find answer for this one

254. Which type of Ethernet cable is used when connecting two network switches or two computers directly?

Answer

Correct Answer: Cross-over

Note: This Question is unanswered, help us to find answer for this one

255. Which is the normal reach of a signal from a wireless router?

Answer

Correct Answer: Depends on the physical constructs of the environment, e.g., walls

Note: This Question is unanswered, help us to find answer for this one

256. Which of the following is an example of a physical network address?

Answer

Correct Answer: MAC address

Note: This Question is unanswered, help us to find answer for this one

257. Which of the following is the name of unit exchanged at network layer?

Answer

Correct Answer: Packets

Note: This Question is unanswered, help us to find answer for this one

258. Which is the maximum Ethernet cable length between repeaters (computers or switches)?

Answer

Correct Answer: 100 m (328 feet)

Note: This Question is unanswered, help us to find answer for this one

259. Which process forwards information packets to hops?

Answer

Correct Answer: Routing

Note: This Question is unanswered, help us to find answer for this one

260. At which port does the FTP client contact the FTP server?

Answer

Correct Answer: 21

Note: This Question is unanswered, help us to find answer for this one

261. Which of the following is the default MTU of a typical Ethernet?

Answer

Correct Answer: 1500

Note: This Question is unanswered, help us to find answer for this one

262. Which of the following defines a protocol?

Answer

Correct Answer: A protocol defines the order and format of messages within a network.

Note: This Question is unanswered, help us to find answer for this one

263. Which protocol is used by Telnet?

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

264. Which is the difference between a network address and a port number?

Answer

Correct Answer: Network address resolves the address of a hardware device, and port number searches and identifies a software application.

Note: This Question is unanswered, help us to find answer for this one

265. If you are able to browse to a website by IP address but not URL, which of these would be the cause?

Answer

Correct Answer: The wireless networking capability on your computer is turned off.

Note: This Question is unanswered, help us to find answer for this one

266. What is the IEEE standard for Ethernet?

Answer

Correct Answer: 802.3

Note: This Question is unanswered, help us to find answer for this one

267. Which layer provide end-to-end delivery:

Answer

Correct Answer: Network layer

Note: This Question is unanswered, help us to find answer for this one

268. How many collision domains exist on a 24 port switch?

Answer

Correct Answer: 24

Note: This Question is unanswered, help us to find answer for this one

269. What protocol does PPP use to identify the Network layer protocol?

Answer

Correct Answer: NCP

Note: This Question is unanswered, help us to find answer for this one

270. Which of the following is the decimal and hexadecimal equivalents of the binary number 01101101?

Answer

Correct Answer: 109, 6D

Note: This Question is unanswered, help us to find answer for this one

271. How does a host determine that an IP address is not located on the local network?

Answer

Correct Answer: "The ANDing process"

Note: This Question is unanswered, help us to find answer for this one

272. Assuming no PPP compression, standard network MTU of 1500, an IP packet that contains a TCP segment with TCP timestamps and is encapsulated in a Ethernet frame with no 802.1q tags, what would the data rate efficiency be?

Answer

Correct Answer: 94.1482%

Note: This Question is unanswered, help us to find answer for this one

273. What is the IP protocol number of TCP?

Answer

Correct Answer: 6

Note: This Question is unanswered, help us to find answer for this one

274. What is circuit switching?

Answer

Correct Answer: A networking model where a computer is assigned dedicated network resources for transmission

Note: This Question is unanswered, help us to find answer for this one

275. An IP header contains a "Blank" field that identifies the type of data that is encapsulated in an IP Packet.

Answer

Correct Answer: The Protocol Number

Note: This Question is unanswered, help us to find answer for this one

276. What is packet switching?

Answer

Correct Answer: A networking model where a computer shares networking resources for transmission.

Note: This Question is unanswered, help us to find answer for this one

277. For UDP/IP or TCP/IP socket communication, what four parameters are generally needed?

Answer

Correct Answer: Source Identifier, Source Port, Destination Identifier, and Destination Port

Note: This Question is unanswered, help us to find answer for this one

278. You have a network address of 192.168.56.0 with four subnets. You want to allow for maximum number of Hosts. What is the subnet mask you need to apply?

Answer

Correct Answer: 255.255.255.192

Note: This Question is unanswered, help us to find answer for this one

279. 138.19.50.0/27 provides how many subnets (including the all 0 and 1s subnet)?

Answer

Correct Answer: 8

Note: This Question is unanswered, help us to find answer for this one

280. How many collision domains exist on an 8 port hub?

Answer

Correct Answer: 1

Note: This Question is unanswered, help us to find answer for this one

281. Which of the following high-speed circuits is the fastest?

Answer

Correct Answer: DS3

Note: This Question is unanswered, help us to find answer for this one

282. Which multiplexing allows an optical fibre to carry multiple optical signals simultaneously

Answer

Correct Answer: WDM

Note: This Question is unanswered, help us to find answer for this one

283. You were given a network address of 67.230.100.64/27 from your ISP, what would the broadcast address be?

Answer

Correct Answer: 67.230.100.95

Note: This Question is unanswered, help us to find answer for this one

284. What is binary 00011000.01001100.00001010 equivalent to in Decimal?

Answer

Correct Answer: 24.76.10

Note: This Question is unanswered, help us to find answer for this one

285. Which protocol does DHCP use at the Transport layer?

Answer

Correct Answer: UDP

Note: This Question is unanswered, help us to find answer for this one

286. Which is NOT a transport layer protocol?

Answer

Correct Answer: SMTP

Note: This Question is unanswered, help us to find answer for this one

287. Which of the following is not a layer of the three tier hierarchical model?

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

288. Which of the following is an example of a Class B network address?

Answer

Correct Answer: 163.4.2.1

Note: This Question is unanswered, help us to find answer for this one

289. An IPv4 header contains a Time To Live (TTL) field, what is the purpose of TTL?

Answer

Correct Answer: To prevent routing loops

Note: This Question is unanswered, help us to find answer for this one

290. Which of the following cable types is most susceptible to cross talk?

Answer

Correct Answer: UTP

Note: This Question is unanswered, help us to find answer for this one

291. What debugging tool would you use to troubleshoot TCP connections from client to a server that was experiencing slow transfers and intermittent connectivity?

Answer

Correct Answer: Wireshark/TCPDump

Note: This Question is unanswered, help us to find answer for this one

292. Which wireless standard is designed for a maximum data tranfer rate of 11 Mb?

Answer

Correct Answer: IEEE 802.11b

Note: This Question is unanswered, help us to find answer for this one

293. Which of the following protocol belongs to "Exterior Gateway Protocol"?

Answer

Correct Answer: BGP

Note: This Question is unanswered, help us to find answer for this one

294. Which layer of the OSI model is responsible for establishing, managing, and terminating communications between two computers?

Answer

Correct Answer: Session

Note: This Question is unanswered, help us to find answer for this one

295. The TCP 3-Way handshake contains three messages that are exchange between two hosts before any application data is transmitted, what does a SYN-ACK message indicate?

Answer

Correct Answer: Second message of a 3-Way handshake

Note: This Question is unanswered, help us to find answer for this one

296. What layer of the OSI model does ICMP work on ?

Answer

Correct Answer: Layer 3

Note: This Question is unanswered, help us to find answer for this one

297. How many layers does a TCP/IP Protocol stack have?

Answer

Correct Answer: 4

Note: This Question is unanswered, help us to find answer for this one

298. IPv4 addresses are divided into how many classes?

Answer

Correct Answer: 5

Note: This Question is unanswered, help us to find answer for this one

299. What command to view routing table in Windows

Answer

Correct Answer: route print

Note: This Question is unanswered, help us to find answer for this one

300. What does RFC1918 provide?

Answer

Correct Answer: 3 ranges of non-routable addresses to use for private networks.

Note: This Question is unanswered, help us to find answer for this one

301. Which method of communication is used to support Ethernet type networks?

Answer

Correct Answer: Broadcast

Note: This Question is unanswered, help us to find answer for this one

302. Which of the following is a rfc1918 address?

Answer

Correct Answer: 10.70.40.103

Note: This Question is unanswered, help us to find answer for this one

303. What is the Subnet Mask of this CIDR Block 123.45.67.89/29?

Answer

Correct Answer: 255.255.255.248

Note: This Question is unanswered, help us to find answer for this one

304. Which of the following documents detail address allocation for private internets?

Answer

Correct Answer: RFC 1918

Note: This Question is unanswered, help us to find answer for this one

305. There are 5 class of IPv4 addresses, what are the class D addresses used for?

Answer

Correct Answer: Multicast

Note: This Question is unanswered, help us to find answer for this one

306. In WLAN, the problem of a station not being able to detect a potential competitor because of being distant is the

Answer

Correct Answer: Hidden Station Problem

Note: This Question is unanswered, help us to find answer for this one

307. At layer 4, what port is reserved for TFTP and what protocol is used?

Answer

Correct Answer: 69, UDP

Note: This Question is unanswered, help us to find answer for this one

308. When a host is generating an ARP packet, what is unknown?

Answer

Correct Answer: The Target’s Ethernet Hardware Address

Note: This Question is unanswered, help us to find answer for this one

309. Your ISP has given you a block of addresses: 199.200.199.0/25; how many IP addresses are available for devices on a network.

Answer

Correct Answer: 126

Note: This Question is unanswered, help us to find answer for this one

310. There are two access points (wireless routers) A and B that belong to the same subnet. What happens when a mobile device connected to A leaves A's range and enters B's range?

Answer

Correct Answer: The mobile device connects to the new access point B and keeps the same IP address.

Note: This Question is unanswered, help us to find answer for this one

311. TCP contains several features that benefit the protocol, which of the following answers is not a feature?

Answer

Correct Answer: Low overhead

Note: This Question is unanswered, help us to find answer for this one

312. Is a socket controlled at the application level in an operating system?

Answer

Correct Answer: Yes

Note: This Question is unanswered, help us to find answer for this one

313. If a maximum MTU was set to 1300 in the Windows Vista operating system, what would be the smallest packet you can send if you utilize the PING command with the Don't Fragment bit option set?

Answer

Correct Answer: 1272

Note: This Question is unanswered, help us to find answer for this one

314. A subset of machines receive and process the packets, this type of addressing is called:

Answer

Correct Answer: Multicast

Note: This Question is unanswered, help us to find answer for this one

315. What is the purpose of the ARP (Address Resolution Protocol)?

Answer

Correct Answer: Resolves an IP address to a MAC address

Note: This Question is unanswered, help us to find answer for this one

316. You are a Network Administrator for the ACME company; one of your webservers had a hardware issue, so you moved the IP address (192.168.1.99) to another webserver. Users from other networks are reporting that they still are not able to access the website. You are able to access the website locally; What is the best answer that will fix the issue.

Answer

Correct Answer: Clear the ARP Cache on the router

Note: This Question is unanswered, help us to find answer for this one

317. What is the primary Layer 3 protocol in the TCP/IP suite?

Answer

Correct Answer: IP

Note: This Question is unanswered, help us to find answer for this one

318. Is a DNS required for hosting a website?

Answer

Correct Answer: No, but that means there will be no translation from hostname to IP address.

Note: This Question is unanswered, help us to find answer for this one

319. In what Operating System(s) are sockets file descriptors?

Answer

Correct Answer: Unix and Mac OSX

Note: This Question is unanswered, help us to find answer for this one

320. Variability of packet delays within the same packet stream is called

Answer

Correct Answer: Jitter

Note: This Question is unanswered, help us to find answer for this one

321. Which protocol is used to send a destination network unknown message back to originating hosts?

Answer

Correct Answer: ICMP

Note: This Question is unanswered, help us to find answer for this one

322. Which topology uses terminators?

Answer

Correct Answer: BUS

Note: This Question is unanswered, help us to find answer for this one

323. What is the maximum speed of a wireless G network?

Answer

Correct Answer: 54Mbps

Note: This Question is unanswered, help us to find answer for this one

324. What or who is responsible for top-level country domains such as uk, ca, and jp?

Answer

Correct Answer: Top-level domain (TLD) servers.

Note: This Question is unanswered, help us to find answer for this one

325. In IPv4 addresses, how many addresses are available?

Answer

Correct Answer: 2^32

Note: This Question is unanswered, help us to find answer for this one

326. What does an assigned IP addres 169.254.0.12 indicate?

Answer

Correct Answer: The computer is configured for DHCP and cannot connect to the DHCP server

Note: This Question is unanswered, help us to find answer for this one

327. Which topology has a single point failure, i.e. One cable broken whole network is off.

Answer

Correct Answer: Bus

Note: This Question is unanswered, help us to find answer for this one

328. The name of unit exchanged at Data Link Layer is called:

Answer

Correct Answer: Frames

Note: This Question is unanswered, help us to find answer for this one

329. A router that responds to an ARP request intended for a remote host is called what?

Answer

Correct Answer: Proxy ARP

Note: This Question is unanswered, help us to find answer for this one

330. For 802.11b wireless, how many frequency channels are available to avoid collisions/interference?

Answer

Correct Answer: 11

Note: This Question is unanswered, help us to find answer for this one

331. Does P2P require an always on server?

Answer

Correct Answer: No

Note: This Question is unanswered, help us to find answer for this one

332. In TCP/IP model, TCP and UDP protocols work on which layer:

Answer

Correct Answer: Transport layer

Note: This Question is unanswered, help us to find answer for this one

333. Which network topology is based on a hierarchy of nodes?

Answer

Correct Answer: Tree

Note: This Question is unanswered, help us to find answer for this one

334. What is the subnet mask of this network: 192.168.0.0/29

Answer

Correct Answer: 255.255.255.248

Note: This Question is unanswered, help us to find answer for this one

335. Which network type can have transmission of data in both directions but not simultaneously.

Answer

Correct Answer: Half Duplex

Note: This Question is unanswered, help us to find answer for this one

336. IP Addresses are 48 bit addresses and MAC addresses are 32 bit addresses written in hexadecimal format

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

337. A network with more than one exit point.

Answer

Correct Answer: different networks could communicate.

Note: This Question is unanswered, help us to find answer for this one

338. Who initiates a connection between a client and server?

Answer

Correct Answer: Client

Note: This Question is unanswered, help us to find answer for this one

339. Which of the following IP addresses is a class A Network?

Answer

Correct Answer: 0.0.0.1

Note: This Question is unanswered, help us to find answer for this one

340. A server that has HTTP services and SMTP services bound to an interface functions with what protocol?

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

341. What fields in the header of an IP packet will be decremented by one that is passed through each router?

Answer

Correct Answer: The Time to Live (TTL)

Note: This Question is unanswered, help us to find answer for this one

342. Where is a hub specified in the OSI model?

Answer

Correct Answer: Physical layer

Note: This Question is unanswered, help us to find answer for this one

343. Which of the following is/are NOT the difference between TCP and UDP?

Answer

Correct Answer: All of them are correct

Note: This Question is unanswered, help us to find answer for this one

344. Which are the default settings for a Windows XP computer network adapter?

Answer

Correct Answer: DHCP and configured as part of a workgroup.

Note: This Question is unanswered, help us to find answer for this one

345. If you wanted to test to see if a TCP port was opened on a server, what command/tool would you use?

Answer

Correct Answer: Telnet

Note: This Question is unanswered, help us to find answer for this one

346. Which service reduce the response time for client request and satisfy client request without involving origin server.

Answer

Correct Answer: Web Caching(Proxy Server)

Note: This Question is unanswered, help us to find answer for this one

347. ____ protocol is used by Telnet.

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

348. Which IPv4 address is not valid?

Answer

Correct Answer: 25.740.265.70

Note: This Question is unanswered, help us to find answer for this one

349. Which switching type has the re-route capability:

Answer

Correct Answer: Packet Switching

Note: This Question is unanswered, help us to find answer for this one

350. Hub is a ----------- device.

Answer

Correct Answer: Broadcast

Note: This Question is unanswered, help us to find answer for this one

351. The default MTU of a typical Ethernet is

Answer

Correct Answer: 1500

Note: This Question is unanswered, help us to find answer for this one

352. IPv6 address space is:

Answer

Correct Answer: 2^128

Note: This Question is unanswered, help us to find answer for this one

353. What is a protocol?

Answer

Correct Answer: A protocol defines the order and format of messages within a network.

Note: This Question is unanswered, help us to find answer for this one

354. Print server uses ________ which is a buffer that holds data before it is send to the printer.

Answer

Correct Answer: Spool

Note: This Question is unanswered, help us to find answer for this one

355. What best describes a client/server model?

Answer

Correct Answer: A client host requests a service from an always-on server.

Note: This Question is unanswered, help us to find answer for this one

356. What is the difference between network address and port number?

Answer

Correct Answer: Network address resolve the address of hardware device and port number search and identify software application.

Note: This Question is unanswered, help us to find answer for this one

357. UDP is an unreliable protocol.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

358. Which device is the central device of star topology?

Answer

Correct Answer: Hub/Switch

Note: This Question is unanswered, help us to find answer for this one

359. Which of the following major networks contain an incorrect subnet mask?

Answer

Correct Answer: Class D with a mask 255.255.255.255 or /32

Note: This Question is unanswered, help us to find answer for this one

360. The process in which information packets are forwarded to hops is called:

Answer

Correct Answer: Routing

Note: This Question is unanswered, help us to find answer for this one

361. How is data transferred over a network?

Answer

Correct Answer: Through chunks called packets.

Note: This Question is unanswered, help us to find answer for this one

362. Is it possible to program at the socket level?

Answer

Correct Answer: Yes

Note: This Question is unanswered, help us to find answer for this one

363. What is the maximum Ethernet cable length between repeaters (computers or switches)?

Answer

Correct Answer: 100 m (328 feet)

Note: This Question is unanswered, help us to find answer for this one

364. A user loads a web browser and browses to http://www.google.com, what is the highest layer of the OSI model the user is functioning at?

Answer

Correct Answer: Application Layer

Note: This Question is unanswered, help us to find answer for this one

365. FTP client contacts FTP server at port:

Answer

Correct Answer: 21

Note: This Question is unanswered, help us to find answer for this one

366. When you connect two network switches or two computers directly what type of Ethernet cable do you need?

Answer

Correct Answer: Cross-over

Note: This Question is unanswered, help us to find answer for this one

367. Which of the following describes how two communicating parties exchange information?

Answer

Correct Answer: Protocols

Note: This Question is unanswered, help us to find answer for this one

368. Can a computer also act as a router?

Answer

Correct Answer: Yes

Note: This Question is unanswered, help us to find answer for this one

369. Which of the network type covers the country level location:

Answer

Correct Answer: Wide area Network

Note: This Question is unanswered, help us to find answer for this one

370. Which item is an example of a physical network address?

Answer

Correct Answer: MAC address

Note: This Question is unanswered, help us to find answer for this one

371. What is the purpose of a static IP?

Answer

Correct Answer: To gaurantee the IP of the computer/server will not change.

Note: This Question is unanswered, help us to find answer for this one

372. Which one is connectionless protocol?

Answer

Correct Answer: UDP

Note: This Question is unanswered, help us to find answer for this one

373. What is the maximum supported distance for an Ethernet cable run?

Answer

Correct Answer: 100m / 328 ft

Note: This Question is unanswered, help us to find answer for this one

374. When can a wireless device NOT connect to a wireless network?

Answer

Correct Answer: All of these.

Note: This Question is unanswered, help us to find answer for this one

375. What is currently the most common and fastest transmission rate for ethernet cables?

Answer

Correct Answer: Gigabit

Note: This Question is unanswered, help us to find answer for this one

376. What technology exists that allows a non-routable IP address to communicate with the global IP Internet Network.

Answer

Correct Answer: NAT (Network Address Translation)

Note: This Question is unanswered, help us to find answer for this one

377. Which is example of wireless encryption?

Answer

Correct Answer: WPA

Note: This Question is unanswered, help us to find answer for this one

378. What is a handshake?

Answer

Correct Answer: The intial set-up between two communicating hosts.

Note: This Question is unanswered, help us to find answer for this one

379. Is it possible for a computer on local network A to talk to a computer on a local network B?

Answer

Correct Answer: Yes only if an entry-point (such as a router) for each local network is provided.

Note: This Question is unanswered, help us to find answer for this one

380. ADSL stands for:

Answer

Correct Answer: Asymmetric digital subscriber line

Note: This Question is unanswered, help us to find answer for this one

381. Which protocol is used for email transmission?

Answer

Correct Answer: IMAP

Note: This Question is unanswered, help us to find answer for this one

382. Which command will display the assigned IP address of a network adpater installed on a Windows XP system?

Answer

Correct Answer: Ipconfig

Note: This Question is unanswered, help us to find answer for this one

383. What is a MAC address?

Answer

Correct Answer: A unique hardware identification number for a network card.

Note: This Question is unanswered, help us to find answer for this one

384. TCP is a ___ protocol.

Answer

Correct Answer: Connection Oriented

Note: This Question is unanswered, help us to find answer for this one

385. A firewall in a Computer Network is a

Answer

Correct Answer: system to prevent unauthorized access.

Note: This Question is unanswered, help us to find answer for this one

386. Which of the following is not a network topology?

Answer

Correct Answer: Access

Note: This Question is unanswered, help us to find answer for this one

387. Which of the following is a connection oriented protocol?

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

388. What is bandwidth?

Answer

Correct Answer: Transmission rate.

Note: This Question is unanswered, help us to find answer for this one

389. What type of network is commonly used in houses?

Answer

Correct Answer: LAN

Note: This Question is unanswered, help us to find answer for this one

390. Which of the following is an Ethernet connector type?

Answer

Correct Answer: RJ-45

Note: This Question is unanswered, help us to find answer for this one

391. Is it possible to connect two computers without using any hubs or routers for network communication?

Answer

Correct Answer: Yes, using a cross-over cable.

Note: This Question is unanswered, help us to find answer for this one

392. Can computers with different operating systems communicate over a network?

Answer

Correct Answer: Yes, network communication is operating system independent. What is important is if the computers are using the same protocol.

Note: This Question is unanswered, help us to find answer for this one

393. What is NIC?

Answer

Correct Answer: Network Interface Card

Note: This Question is unanswered, help us to find answer for this one

394. Port number of HTTP is:

Answer

Correct Answer: 80

Note: This Question is unanswered, help us to find answer for this one

395. Which is the best example of a secure password?

Answer

Correct Answer: MySpecialPa$$w0rd

Note: This Question is unanswered, help us to find answer for this one

396. Open System Interconnection (OSI) Model has following layers:

Answer

Correct Answer: 7

Note: This Question is unanswered, help us to find answer for this one

397. Which IP address is reserved for loopback testing and debugging?

Answer

Correct Answer: 127.0.0.1

Note: This Question is unanswered, help us to find answer for this one

398. The name of unit exchanged at network layer is called:

Answer

Correct Answer: Packets

Note: This Question is unanswered, help us to find answer for this one

399. When using the PING utility, what are you trying to accomplish?

Answer

Correct Answer: Does connectivity exist between two IP end points

Note: This Question is unanswered, help us to find answer for this one

400. What is the normal reach of a signal from a wireless router?

Answer

Correct Answer: Depends on the physical constructs of the environment, e.g., walls.

Note: This Question is unanswered, help us to find answer for this one

401. Given the IP address 82.77.201.1/24, what is the network number?

Answer

Correct Answer: 82.77.201.0

Note: This Question is unanswered, help us to find answer for this one

402. In the Command Prompt, what is the command to show the most detailed printout of IP address info?

Answer

Correct Answer: ipconfig /all

Note: This Question is unanswered, help us to find answer for this one

Computer Networking MCQs | Topic-wise