Most frequently asked Networking Multiple Choice Questions and Answers pdf free download
1. What is the other types of OLAP apart from ROLAP?
2. A network router joins two _________ together?
3. Message Oriented Middle ware allows general purpose messages to be exchanged in a Client/Server system using message queues.
4. Which of the following below is a loop back IP address?
5. Ping command works on which protocol?
6. Transport layer of OSI model lies between Network and ___________ layer
7. Which of the following protocols below work in application layer?
8. What is the port number for HTTP?
9. IP4 is more commonly used than IPv6?
10. From the options below, which suits best for MODEM?
11. What is the size of an IP address?
12. MAC addresses are also known as?
13. A network point that provides entrance into another network is called as ___________.
14. UDP is an unreliable protocol.
15. A stream socket provides _________ communications between a client and server.
16. Token Ring is a data link technology for ?
17. Which of the following protocol below are suited for email retrieval?
18. TELNET used _________ protocol for data connection.
19. 10Base5, 10Base2, 10BaseT are types of?
20. The process of assigning IP address for specific times to the various hosts by DHCP is called as?
21. What is the full form of URL?
22. __________ is a standard suite of protocols used for packet switching across computer networks.
23. What is the full form of CAN?
24. Which of the following below is/are capability of ICMP protocol?
25. ARP works on Ethernet networks.
26. ____________ assigns a unique number to each IP network adapter called the MAC address.
27. Piconets in blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices.
28. Dynamic addressing doesn’t allow many devices to share limited address space on a network.
29. NAT stands for______ .
30. Which of the following is true for secure shell tunneling?
31. Which of the following below are secure VPN protocols?
32. What is the difference between a switch and a hub?
33. When computers in a network listen and receive the signal, it is termed as active topology.
34. In 10base2, 10base5, what does 2 and 5 stand for?
35. ____________ is added to data packet for error detection.
36. ALL IP addresses are divided into network address and host address.
37. How can we examine the current routing tables in command prompt?
38. Both ping and tracery are used to find If the computer is in network.
39. What is the difference between ring and bus topology?
40. MAC addressing works in data link layer while IP addressing works in network layer.
41. A packet whose destination is outside the local TCP/IP network segment is sent to the _____ .
42. Why was the OSI model developed?
43. Which piece of information is not vital for a computer in a TCP/IP network?
44. The physical layer is concerned with the movement of _______ over the physical medium.
45. Which protocol below operates at the network layer in the OSI model?
46. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
47. Session layer of the OSI model provides
48. IPv6 has _______ -bit addresses.
49. Which one of the following functionality is n\'t provided by TCP?
50. Which of the following can be an Ethernet physical address?
51. An IP address contains________ bits ?
52. Which routing protocol below is used by exterior routers between the autonomous systems?
53. Which of the IP headers decides when the packet should be discarded?
54. Which IP address is reserved for software loop-back?
55. What is the network ID for a computer whose IP address is 190.148.64.23?
56. Which port is reserved for use of the SMTP protocol?
57. Which one of the followings is a connectionless protocol?
58. Which application below uses the UDP protocol?
59. How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192?
60. Which of the followings is not a direct implication of subnet masks in TCP/IP networks?
1. What is the other types of OLAP apart from ROLAP?
2. A network router joins two _________ together?
3. Message Oriented Middle ware allows general purpose messages to be exchanged in a Client/Server system using message queues.
4. Which of the following below is a loop back IP address?
5. Ping command works on which protocol?
6. Transport layer of OSI model lies between Network and ___________ layer
7. Which of the following protocols below work in application layer?
8. What is the port number for HTTP?
9. IP4 is more commonly used than IPv6?
10. From the options below, which suits best for MODEM?
11. What is the size of an IP address?
12. MAC addresses are also known as?
13. A network point that provides entrance into another network is called as ___________.
14. UDP is an unreliable protocol.
15. A stream socket provides _________ communications between a client and server.
16. Token Ring is a data link technology for ?
17. Which of the following protocol below are suited for email retrieval?
18. TELNET used _________ protocol for data connection.
19. 10Base5, 10Base2, 10BaseT are types of?
20. The process of assigning IP address for specific times to the various hosts by DHCP is called as?
21. What is the full form of URL?
22. __________ is a standard suite of protocols used for packet switching across computer networks.
23. What is the full form of CAN?
24. Which of the following below is/are capability of ICMP protocol?
25. ARP works on Ethernet networks.
26. ____________ assigns a unique number to each IP network adapter called the MAC address.
27. Piconets in blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices.
28. Dynamic addressing doesn’t allow many devices to share limited address space on a network.
29. NAT stands for______ .
30. Which of the following is true for secure shell tunneling?
31. Which of the following below are secure VPN protocols?
32. What is the difference between a switch and a hub?
33. When computers in a network listen and receive the signal, it is termed as active topology.
34. In 10base2, 10base5, what does 2 and 5 stand for?
35. ____________ is added to data packet for error detection.
36. ALL IP addresses are divided into network address and host address.
37. How can we examine the current routing tables in command prompt?
38. Both ping and tracery are used to find If the computer is in network.
39. What is the difference between ring and bus topology?
40. MAC addressing works in data link layer while IP addressing works in network layer.
41. A packet whose destination is outside the local TCP/IP network segment is sent to the _____ .
42. Why was the OSI model developed?
43. Which piece of information is not vital for a computer in a TCP/IP network?
44. The physical layer is concerned with the movement of _______ over the physical medium.
45. Which protocol below operates at the network layer in the OSI model?
46. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
47. Session layer of the OSI model provides
48. IPv6 has _______ -bit addresses.
49. Which one of the following functionality is n\'t provided by TCP?
50. Which of the following can be an Ethernet physical address?
51. An IP address contains________ bits ?
52. Which routing protocol below is used by exterior routers between the autonomous systems?
53. Which of the IP headers decides when the packet should be discarded?
54. Which IP address is reserved for software loop-back?
55. What is the network ID for a computer whose IP address is 190.148.64.23?
56. Which port is reserved for use of the SMTP protocol?
57. Which one of the followings is a connectionless protocol?
58. Which application below uses the UDP protocol?
59. How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192?
60. Which of the followings is not a direct implication of subnet masks in TCP/IP networks?
No comments:
Post a Comment